Instagram wasn’t removing photos and direct messages from its servers
A security researcher was awarded a $6,000 bug bounty payout after he found Instagram retained photos and private direct messages on its servers long after he deleted them.
Independent security researcher Saugat Pokharel found that when he downloaded his data from Instagram, a feature it launched in 2018 to comply with new European data rules, his downloaded data contained photos and private messages with other users that he had previously deleted.
https://techcrunch.com/2020/08/13/instagram-delete-photos-messages-servers/
A security researcher was awarded a $6,000 bug bounty payout after he found Instagram retained photos and private direct messages on its servers long after he deleted them.
Independent security researcher Saugat Pokharel found that when he downloaded his data from Instagram, a feature it launched in 2018 to comply with new European data rules, his downloaded data contained photos and private messages with other users that he had previously deleted.
https://techcrunch.com/2020/08/13/instagram-delete-photos-messages-servers/
The Internet Looked at My Private Photos and Made an Ad
Super sophisticated and creepy advertising machine apparently doesn’t understand style.
We generally accept that our phones listen to us in order to serve up ads that are more effective. And yeah, we’re cool with that. And, until recently, I was cool with that.
Over the past couple of years I’ve noticed “coincidences” that have fed my yearning for a good old conspiracy theory — not the alt-right kind that drives vulnerable people to take drastic action (like drinking bleach, taking pills, and acting violently after the likes of Trump fuels the conspiracy fire) — but the kind that brings me back to the days of Mulder and Scully in the X-Files.
https://medium.com/predict/the-internet-looked-at-my-private-photos-and-made-an-ad-b5b00724fd33
Super sophisticated and creepy advertising machine apparently doesn’t understand style.
We generally accept that our phones listen to us in order to serve up ads that are more effective. And yeah, we’re cool with that. And, until recently, I was cool with that.
Over the past couple of years I’ve noticed “coincidences” that have fed my yearning for a good old conspiracy theory — not the alt-right kind that drives vulnerable people to take drastic action (like drinking bleach, taking pills, and acting violently after the likes of Trump fuels the conspiracy fire) — but the kind that brings me back to the days of Mulder and Scully in the X-Files.
https://medium.com/predict/the-internet-looked-at-my-private-photos-and-made-an-ad-b5b00724fd33
Medium
The Internet Looked at My Private Photos and Made an Ad
Super sophisticated and creepy advertising machine apparently doesn’t understand style.
Google's secret home security superpower: Your smart speaker with its always-on mics
Google speakers are listening to more than just voice commands. Using them for home security could supercharge Google's $450 million ADT deal.
Last week, Reddit user Brazedowl received a curious notification on his phone: Google was telling him that a smoke detector in his home had gone off. Brazedowl, a teacher from North Carolina who goes by Drew in real life, knew about the smoke alarm — he was at home himself and had just fried some sausages in his kitchen. But up until that moment, he had no idea that his smart speaker was able to detect such events. "Google just made my dumb smoke detectors smart," he wrote on Reddit. "Pretty rad."
A Google spokesperson told Protocol that the feature was accidentally enabled for some users through a recent software update and has since been rolled back. But in light of Monday's news that Google invested $450 million — acquiring a 6.6% stake — in home security provider ADT, it may be a sign of things to come for Google, as it hints at the company's secret home security superpower: millions of smart speakers already in people's homes.
https://www.protocol.com/google-smart-speaker-alarm-adt
Google speakers are listening to more than just voice commands. Using them for home security could supercharge Google's $450 million ADT deal.
Last week, Reddit user Brazedowl received a curious notification on his phone: Google was telling him that a smoke detector in his home had gone off. Brazedowl, a teacher from North Carolina who goes by Drew in real life, knew about the smoke alarm — he was at home himself and had just fried some sausages in his kitchen. But up until that moment, he had no idea that his smart speaker was able to detect such events. "Google just made my dumb smoke detectors smart," he wrote on Reddit. "Pretty rad."
A Google spokesperson told Protocol that the feature was accidentally enabled for some users through a recent software update and has since been rolled back. But in light of Monday's news that Google invested $450 million — acquiring a 6.6% stake — in home security provider ADT, it may be a sign of things to come for Google, as it hints at the company's secret home security superpower: millions of smart speakers already in people's homes.
https://www.protocol.com/google-smart-speaker-alarm-adt
Protocol
Google's secret home security superpower: Your smart speaker with its always-on mics
Google speakers are listening to more than just voice commands. Using them for home security could supercharge Google's $450 million ADT deal.
#techsource #article #hongkiat
19 Useful Google Apps Scripts to Automate Google Drive
Join Us @techbite @cosmotory
URL: https://bit.ly/2Y5C0jN
19 Useful Google Apps Scripts to Automate Google Drive
Join Us @techbite @cosmotory
URL: https://bit.ly/2Y5C0jN
Hongkiat
19 Useful Google Apps Scripts to Automate Google Drive - Hongkiat
Google Drive offers great features for storing and working with different types of files but it does lack some features that are crucial for your work.
#techsource #article #hongkiat
How to Manage Files Across Different Cloud Storage in Android
Join Us @techbite @cosmotory
URL: https://bit.ly/2FtKE5l
How to Manage Files Across Different Cloud Storage in Android
Join Us @techbite @cosmotory
URL: https://bit.ly/2FtKE5l
Hongkiat
How to Manage Files Across Different Cloud Storage in Android - Hongkiat
If you have data in multiple cloud storage accounts, managing it becomes difficult. You have to switch between apps and ensure there is no data
Elon Musk says he's terrified of AI taking over the world and most scared of Google's DeepMind AI project
Elon Musk has been sounding the alarm about the potentially dangerous, species-ending future of artificial intelligence for years.
In 2016, the billionaire said human beings could become the equivalent of "house cats" to new AI overlords. He has since repeatedly called for regulation and caution when it comes to new AI technology.
But of all the various AI projects in the works, none has Musk more worried than Google's DeepMind.
"Just the nature of the AI that they're building is one that crushes all humans at all games," Musk told The New York Times in an interview. "I mean, it's basically the plotline in 'WarGames.'"
https://www.businessinsider.com/elon-musk-maureen-dowd-ai-google-deepmind-wargames-2020-7
Elon Musk has been sounding the alarm about the potentially dangerous, species-ending future of artificial intelligence for years.
In 2016, the billionaire said human beings could become the equivalent of "house cats" to new AI overlords. He has since repeatedly called for regulation and caution when it comes to new AI technology.
But of all the various AI projects in the works, none has Musk more worried than Google's DeepMind.
"Just the nature of the AI that they're building is one that crushes all humans at all games," Musk told The New York Times in an interview. "I mean, it's basically the plotline in 'WarGames.'"
https://www.businessinsider.com/elon-musk-maureen-dowd-ai-google-deepmind-wargames-2020-7
Business Insider
Elon Musk says he's terrified of AI taking over the world and most scared of Google's DeepMind AI project
Tesla and SpaceX CEO Elon Musk, who has repeatedly warned of the dangers of artificial intelligence, said he was most worried about Google's AI.
We need a full investigation into Siri's secret surveillance campaign
The public deserves to know the extent to which Apple employees have been listening to our private conversations and intimate moments
No one wants their most private activities secretly monitored. That’s why wiretapping is strictly regulated in the US and most of the world. Federal law makes it a crime for the government to surveil communications without a court-ordered warrant. This is not the issue here. Nor is this a case involving one-party consent. Who authorized the makers of Apple’s Siri and their vendors to listen to private conversations in my home? Not me. So why should Apple be allowed to do this? This is what we must find out.
https://www.theguardian.com/commentisfree/2020/aug/14/apple-siri-secret-surveillance-campaign-investigation
The public deserves to know the extent to which Apple employees have been listening to our private conversations and intimate moments
No one wants their most private activities secretly monitored. That’s why wiretapping is strictly regulated in the US and most of the world. Federal law makes it a crime for the government to surveil communications without a court-ordered warrant. This is not the issue here. Nor is this a case involving one-party consent. Who authorized the makers of Apple’s Siri and their vendors to listen to private conversations in my home? Not me. So why should Apple be allowed to do this? This is what we must find out.
https://www.theguardian.com/commentisfree/2020/aug/14/apple-siri-secret-surveillance-campaign-investigation
the Guardian
We need a full investigation into Siri's secret surveillance campaign | Ted Greenberg
The public deserves to know the extent to which Apple employees have been listening to our private conversations and intimate moments
Lawsuit: Zoom Lied About Security Measures, End-to-End Encryption
The lawsuit claims that Zoom never had end-to-end encryption, despite it telling customers that it did.
Zoom is facing another lawsuit alleging that the video communications company has deceived consumers by making false claims about its privacy measures.
FOX Business reports that the most recent lawsuit was filed by Consumer Watchdog on behalf of Washington, D.C., consumers. In a Monday filing, Consumer Watchdog claimed that Zoom has made false representations about the platform’s security, such as its being equipped with “end-to-end encryption.”
https://www.legalreader.com/lawsuit-zoom-lied-security-measures-end-to-end-encryption/
The lawsuit claims that Zoom never had end-to-end encryption, despite it telling customers that it did.
Zoom is facing another lawsuit alleging that the video communications company has deceived consumers by making false claims about its privacy measures.
FOX Business reports that the most recent lawsuit was filed by Consumer Watchdog on behalf of Washington, D.C., consumers. In a Monday filing, Consumer Watchdog claimed that Zoom has made false representations about the platform’s security, such as its being equipped with “end-to-end encryption.”
https://www.legalreader.com/lawsuit-zoom-lied-security-measures-end-to-end-encryption/
Legal Reader
Lawsuit: Zoom Lied About Security Measures, End-to-End Encryption - Legal Reader
Zoom is facing another lawsuit alleging that the video communications company has deceived consumers by making false claims about its privacy measures.
Microsoft tells Windows 10 users they can never uninstall Edge. Wait, what?
The new Edge is a very good browser. It's like Chrome --only better. But Microsoft has managed to annoy Windows 10 users by making Edge very difficult to ignore.
In the annals of brilliant sales techniques, Microsoft doesn't always get good reviews.
Even when it has a fine product to sell.
Over the last few weeks, I've been banging my head against several floorboards as I've listened to readers complaining about what they see as Microsoft's sneaky maneuvers. Specifically, concerning the new Edge browser.
This is a very good browser. It's like Chrome -- Redmond based it on the Chromium platform, after all -- but it's better.
Microsoft has, however, been annoying Windows 10 users by making it very difficult to ignore -- or even eliminate -- Edge. Some believe Edge is stealing their Chrome data.
https://www.zdnet.com/article/microsoft-tells-windows-10-users-they-can-never-uninstall-edge-wait-what
The new Edge is a very good browser. It's like Chrome --only better. But Microsoft has managed to annoy Windows 10 users by making Edge very difficult to ignore.
In the annals of brilliant sales techniques, Microsoft doesn't always get good reviews.
Even when it has a fine product to sell.
Over the last few weeks, I've been banging my head against several floorboards as I've listened to readers complaining about what they see as Microsoft's sneaky maneuvers. Specifically, concerning the new Edge browser.
This is a very good browser. It's like Chrome -- Redmond based it on the Chromium platform, after all -- but it's better.
Microsoft has, however, been annoying Windows 10 users by making it very difficult to ignore -- or even eliminate -- Edge. Some believe Edge is stealing their Chrome data.
https://www.zdnet.com/article/microsoft-tells-windows-10-users-they-can-never-uninstall-edge-wait-what
ZDNet
Microsoft tells Windows 10 users they can never uninstall Edge. Wait, what? | ZDNet
The new Edge is a very good browser. It's like Chrome --only better. But Microsoft has managed to annoy Windows 10 users by making Edge very difficult to ignore.
The information catastrophe
Currently, we produce ∼1021 digital bits of information annually on Earth. Assuming a 20% annual growth rate, we estimate that after ∼350 years from now, the number of bits produced will exceed the number of all atoms on Earth, ∼1050. After ∼300 years, the power required to sustain this digital production will exceed 18.5 × 1015 W, i.e., the total planetary power consumption today, and after ∼500 years from now, the digital content will account for more than half Earth’s mass, according to the mass-energy–information equivalence principle.
Besides the existing global challenges such as #climate, #environment, #population, #food, #health, #energy, and #security, our estimates point to another singular event for our planet, called #information #catastrophe
https://aip.scitation.org/doi/10.1063/5.0019941
Currently, we produce ∼1021 digital bits of information annually on Earth. Assuming a 20% annual growth rate, we estimate that after ∼350 years from now, the number of bits produced will exceed the number of all atoms on Earth, ∼1050. After ∼300 years, the power required to sustain this digital production will exceed 18.5 × 1015 W, i.e., the total planetary power consumption today, and after ∼500 years from now, the digital content will account for more than half Earth’s mass, according to the mass-energy–information equivalence principle.
Besides the existing global challenges such as #climate, #environment, #population, #food, #health, #energy, and #security, our estimates point to another singular event for our planet, called #information #catastrophe
https://aip.scitation.org/doi/10.1063/5.0019941
AIP Publishing
The information catastrophe
Currently, we produce ∼1021 digital bits of information annually on Earth. Assuming a 20% annual growth rate, we estimate that after ∼350 years from now, the nu
#techsource #article #hongkiat
How to Build Self-Hosted (Private) Cloud For Free
Join Us @techbite @cosmotory
URL: https://bit.ly/2E868UC
How to Build Self-Hosted (Private) Cloud For Free
Join Us @techbite @cosmotory
URL: https://bit.ly/2E868UC
Hongkiat
How to Build Self-Hosted (Private) Cloud For Free - Hongkiat
Detailed look at Nextcloud that allows you to create your own reliable and free cloud storage.
Forwarded from Freemium
Windscribe Premium VPN! 🥳🔥
50 GB Per/Month Premium Access.
Steps :
Go to : Link
Sign-up with New Account, Verify your Email Address & Then Use below
Voucher Code!
Enjoy & Join us @theFreemium ♥️
50 GB Per/Month Premium Access.
Steps :
Go to : Link
Sign-up with New Account, Verify your Email Address & Then Use below
Voucher Code!
BATKA420Send Screenshots at @thefreemiumbot
Enjoy & Join us @theFreemium ♥️
Tired of Gmail? Try a Privacy-First Email Provider.
Your inbox holds plenty of sensitive information. Here are some alternatives that put your correspondence under lock and key.
A large part of your online life revolves around your email address. It acts as a central hub for almost everything you do: Travel documents and itineraries arrive there, it’s home to receipts for all your Amazon purchases, it acts as a recovery mechanism for the sites and apps you sign up for and then forget your login details. And, of course, there are all the emails you send.
https://www.wired.com/story/tired-of-gmail-try-a-privacy-first-email-provider/
Your inbox holds plenty of sensitive information. Here are some alternatives that put your correspondence under lock and key.
A large part of your online life revolves around your email address. It acts as a central hub for almost everything you do: Travel documents and itineraries arrive there, it’s home to receipts for all your Amazon purchases, it acts as a recovery mechanism for the sites and apps you sign up for and then forget your login details. And, of course, there are all the emails you send.
https://www.wired.com/story/tired-of-gmail-try-a-privacy-first-email-provider/
#techsource #article #raywenderlich
Unit Testing Core Data in iOS [FREE]
Testing code is a crucial part of app development, and Core Data is not exempt from this. This tutorial will teach you how you can test Core Data.
Join Us @techbite @cosmotory
URL: https://bit.ly/347Lz5R
Unit Testing Core Data in iOS [FREE]
Testing code is a crucial part of app development, and Core Data is not exempt from this. This tutorial will teach you how you can test Core Data.
Join Us @techbite @cosmotory
URL: https://bit.ly/347Lz5R
raywenderlich.com
Unit Testing Core Data in iOS
Testing code is a crucial part of app development, and Core Data is not exempt from this. This tutorial will teach you how you can test Core Data.
#techsource #article #csstricks
What Happens When Border Radii Overlap?
Join Us @techbite @freemium13
URL: https://bit.ly/3aukxqq
What Happens When Border Radii Overlap?
Join Us @techbite @freemium13
URL: https://bit.ly/3aukxqq
CSS-Tricks
What Happens When Border Radii Overlap?
I’d wager that most times we’re rounding box corners in CSS, we’re applying a uniform border-radius value across the border. It’s a nice touch of polish
#techsource #article #raywenderlich
Extension Functions and Properties in Kotlin [FREE]
In this tutorial for Android, you’ll learn to use Kotlin extension functions and properties to extend the functionality of existing classes.
Join Us @techbite @cosmotory
URL: https://bit.ly/3aw3vYM
Extension Functions and Properties in Kotlin [FREE]
In this tutorial for Android, you’ll learn to use Kotlin extension functions and properties to extend the functionality of existing classes.
Join Us @techbite @cosmotory
URL: https://bit.ly/3aw3vYM
raywenderlich.com
Extension Functions and Properties in Kotlin
In this tutorial for Android, you’ll learn to use Kotlin extension functions and properties to extend the functionality of existing classes.
#techsource #article #freeCodeCamp
Product Design Explained in Plain English
Product design is the process you go through when you conceptualize and build a product. The path to building – hardware, software, or even simple prototypes – has different steps and approaches. I have built products at Google and WFHAdviser.com and advised companies who are building products in the web development
URL: https://bit.ly/324BdAO
Product Design Explained in Plain English
Product design is the process you go through when you conceptualize and build a product. The path to building – hardware, software, or even simple prototypes – has different steps and approaches. I have built products at Google and WFHAdviser.com and advised companies who are building products in the web development
URL: https://bit.ly/324BdAO
freeCodeCamp.org
Product Design Explained in Plain English
Product design is the process you go through when you conceptualize and build a
product.
The path to building – hardware, software, or even simple prototypes – has
different steps and approaches.
I have built products at Google and WFHAdviser.com [http…
product.
The path to building – hardware, software, or even simple prototypes – has
different steps and approaches.
I have built products at Google and WFHAdviser.com [http…
#techsource #article #freeCodeCamp
Beginner React Project - How to Build Basic Forms Using React Hooks
What we're building In this beginner React Project, we're going to learn how to build basic forms using React hooks. We'll learn how to manage form state, handle validation, and work with submit handlers. Check it out: Try it yourself If you want to have a go yourself first, here
URL: https://bit.ly/3aEVmS8
Beginner React Project - How to Build Basic Forms Using React Hooks
What we're building In this beginner React Project, we're going to learn how to build basic forms using React hooks. We'll learn how to manage form state, handle validation, and work with submit handlers. Check it out: Try it yourself If you want to have a go yourself first, here
URL: https://bit.ly/3aEVmS8
freeCodeCamp.org
Beginner React Project - How to Build Basic Forms Using React Hooks
What we're building
In this beginner React Project, we're going to learn how to build basic forms
using React hooks. We'll learn how to manage form state, handle validation, and
work with submit handlers.
Check it out:
Try it yourself
If you want to have…
In this beginner React Project, we're going to learn how to build basic forms
using React hooks. We'll learn how to manage form state, handle validation, and
work with submit handlers.
Check it out:
Try it yourself
If you want to have…
#techsource #article #freeCodeCamp
Python Unique List – How to Get all the Unique Values in a List or Array
Say you have a list that contains duplicate numbers: numbers = [1, 1, 2, 3, 3, 4] But you want a list of unique numbers. unique_numbers = [1, 2, 3, 4] There are a few ways to get a list of unique values in Python. This article will show you how.
URL: https://bit.ly/2Q108zH
Python Unique List – How to Get all the Unique Values in a List or Array
Say you have a list that contains duplicate numbers: numbers = [1, 1, 2, 3, 3, 4] But you want a list of unique numbers. unique_numbers = [1, 2, 3, 4] There are a few ways to get a list of unique values in Python. This article will show you how.
URL: https://bit.ly/2Q108zH
freeCodeCamp.org
Python Unique List – How to Get all the Unique Values in a List or Array
Say you have a list that contains duplicate numbers:
numbers = [1, 1, 2, 3, 3, 4]
But you want a list of unique numbers.
unique_numbers = [1, 2, 3, 4]
There are a few ways to get a list of unique values in Python. This article will
show you how.
Option…
numbers = [1, 1, 2, 3, 3, 4]
But you want a list of unique numbers.
unique_numbers = [1, 2, 3, 4]
There are a few ways to get a list of unique values in Python. This article will
show you how.
Option…
#techsource #article #raywenderlich
Will raywenderlich.com Books Be Updated in 2020? [FREE]
We’re happy to announce we’ll be updating many of our books in the coming months — and we have some great new titles underway!
Join Us @techbite @cosmotory
URL: https://bit.ly/2Y7Jxi6
Will raywenderlich.com Books Be Updated in 2020? [FREE]
We’re happy to announce we’ll be updating many of our books in the coming months — and we have some great new titles underway!
Join Us @techbite @cosmotory
URL: https://bit.ly/2Y7Jxi6
raywenderlich.com
Will raywenderlich.com Books Be Updated in 2020?
We’re happy to announce we’ll be updating many of our books in the coming months — and we have some great new titles underway!
#article #wired
Honestly, Just Vote In Person—It’s Safer Than You Think
Join Us @cosmotory @techbite
URL: https://bit.ly/348f0EL
Honestly, Just Vote In Person—It’s Safer Than You Think
Join Us @cosmotory @techbite
URL: https://bit.ly/348f0EL
Wired
Honestly, Just Vote In Person—It’s Safer Than You Think
The panic over the US Postal Service is legitimate, but here’s the good news: It's not that risky to cast a ballot by hand.