<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-05-03T05:42:58Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by Brian Greenberg :verified:</title>
  <author>
    <name>Brian Greenberg :verified:</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1qh2cmxlhetw8yld5vdd0ufda4ez2c2c8y0men30rr02pm5sa3ynslsecu6.rss" />
  <link href="https://yabu.me/npub1qh2cmxlhetw8yld5vdd0ufda4ez2c2c8y0men30rr02pm5sa3ynslsecu6" />
  <id>https://yabu.me/npub1qh2cmxlhetw8yld5vdd0ufda4ez2c2c8y0men30rr02pm5sa3ynslsecu6</id>
  <icon>https://media.infosec.exchange/infosec.exchange/accounts/avatars/114/224/012/052/749/216/original/1e11732d1ff94efc.jpeg</icon>
  <logo>https://media.infosec.exchange/infosec.exchange/accounts/avatars/114/224/012/052/749/216/original/1e11732d1ff94efc.jpeg</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsxndyctrx3z5hu5h2qvspjlzjw6w39el99024q45exjwpjnvpmnagzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwhy5zmp</id>
    
      <title type="html">The FCC forgot hotspots were a thing. They announced a ban on ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxndyctrx3z5hu5h2qvspjlzjw6w39el99024q45exjwpjnvpmnagzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwhy5zmp" />
    <content type="html">
      The FCC forgot hotspots were a thing. They announced a ban on foreign-made consumer routers a month ago and had to update their FAQ to add MiFi devices and cellular home routers after the fact. That&amp;#39;s not a minor oversight... it&amp;#39;s the whole work-from-anywhere use case.&lt;br/&gt;&lt;br/&gt;Here&amp;#39;s the part that should bother you. The only way to get an exemption is to commit to US-based manufacturing and submit a time-bound plan to get there. Netgear, eero, and Adtran got conditional approval, but it runs out October 1, 2027. There is no domestic consumer router industry to speak of right now. So the FCC has created a countdown clock against a factory floor that doesn&amp;#39;t exist yet.&lt;br/&gt;A few things worth sitting with:&lt;br/&gt;- The Global Electronics Association pointed out that security vulnerabilities show up across products regardless of where they&amp;#39;re made. Geography isn&amp;#39;t the filter; code quality is.&lt;br/&gt;- The Covered List used to apply to specific companies flagged for specific reasons. Extending it to an entire product category means the government can now ban any internet-connected device made abroad by citing national security. Smartphones aren&amp;#39;t included yet. &amp;#34;Yet&amp;#34; is doing a lot of work in that sentence.&lt;br/&gt;- The Register&amp;#39;s headline from last month said it plainly: the country that put backdoors in Cisco routers to spy on the world is now banning foreign routers. I didn&amp;#39;t write that. They did. But they&amp;#39;re not wrong.&lt;br/&gt;&lt;br/&gt;If you&amp;#39;re in security or IT leadership, watch the October 2027 date. That&amp;#39;s when the conditional approvals expire, and if the manufacturing commitments aren&amp;#39;t met, the options get ugly fast.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.theregister.com/2026/04/24/fcc_does_a_doubletake_adds/&#34;&gt;https://www.theregister.com/2026/04/24/fcc_does_a_doubletake_adds/&lt;/a&gt;&lt;br/&gt;#Cybersecurity #FCC #NetworkSecurity #security #privacy #cloud #infosec
    </content>
    <updated>2026-04-24T21:59:25Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw7x7jztnlf34sf9nw5jkpslesdf8fe3yvkrml58er5v6e7548apqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw8qk8ah</id>
    
      <title type="html">An ex-Azure engineer published six essays arguing Microsoft&amp;#39;s ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw7x7jztnlf34sf9nw5jkpslesdf8fe3yvkrml58er5v6e7548apqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw8qk8ah" />
    <content type="html">
      An ex-Azure engineer published six essays arguing Microsoft&amp;#39;s cloud has been on life support since 2008, and the cause isn&amp;#39;t bad code. It&amp;#39;s bad people decisions. Rushed launch, post-launch talent exodus, no testing discipline, no architectural vision. Sound familiar to anyone who&amp;#39;s worked in a place that ships first and staffs later?&lt;br/&gt;&lt;br/&gt;Now layer 2026 on top. Microsoft cut roughly 15,000 jobs in mid-2025. Coding agents are pumping out 4x more commits in 90 days. GitHub&amp;#39;s unofficial uptime has slipped under 90% and the proposed fix is, wait for it, moving more of GitHub onto Azure. The same Azure the engineer says is held together with rushed decisions and wishful thinking.&lt;br/&gt;&lt;br/&gt;🧠 The phrase that stuck with me is &amp;#34;knowledge dilution from high attrition.&amp;#34; When the senior people who knew why a system was built that way leave, no LLM in the world can recover that context&lt;br/&gt;🤖 More AI-written code does not mean less work. It means more code to review, test, deploy, and run, which means more compute and more humans needed downstream&lt;br/&gt;📉 OpenAI signing an $11.9B compute deal with CoreWeave in March 2025 was the loudest &amp;#34;we don&amp;#39;t trust your capacity&amp;#34; signal Microsoft has ever received from its closest partner&lt;br/&gt;🪑 The bet that AI lets you cut headcount keeps colliding with the reality that AI generates work for humans faster than it removes it&lt;br/&gt;&lt;br/&gt;Every CIO I talk to is being pitched the same dream: fewer engineers, more agents, lower run rate. The Azure story is what happens when that math doesn&amp;#39;t pencil out and the bill comes due in incidents instead of dollars.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.theregister.com/2026/04/04/azure_talent_exodus/&#34;&gt;https://www.theregister.com/2026/04/04/azure_talent_exodus/&lt;/a&gt;&lt;br/&gt;#Azure #AI #Leadership #security #privacy #cloud #infosec #cybersecurity #software #devops
    </content>
    <updated>2026-04-22T06:15:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfj8zgtzuzzjqx6sjsmahyn6rf5q6g3cqctfe7qpzfcs2y9fp9cmgzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwgthkc5</id>
    
      <title type="html">😳 Someone hid a prompt injection inside invisible markdown ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfj8zgtzuzzjqx6sjsmahyn6rf5q6g3cqctfe7qpzfcs2y9fp9cmgzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwgthkc5" />
    <content type="html">
      😳 Someone hid a prompt injection inside invisible markdown comments in a pull request. A developer asked Copilot to review the PR. Copilot read the hidden instructions, searched the codebase for AWS keys, encoded them in base16, and smuggled them out through GitHub&amp;#39;s own image proxy as 1x1 transparent pixels. The CSP didn&amp;#39;t flag it because the traffic was routed through GitHub&amp;#39;s trusted infrastructure. CVSS 9.6. No malicious code ever executed.&lt;br/&gt;&lt;br/&gt;The attacker weaponized the AI assistant&amp;#39;s own access permissions. Copilot could see everything the developer could see, and it can&amp;#39;t distinguish a legitimate instruction from a hidden one buried in a PR description.&lt;br/&gt;&lt;br/&gt;🔍 The attack, dubbed &amp;#34;CamoLeak,&amp;#34; was patched by GitHub in August 2025 and publicly disclosed in October&lt;br/&gt;🔑 Copilot was directed to find secrets like API keys and cloud credentials, then exfiltrate them character by character&lt;br/&gt;🖼️ Data was hidden inside pre-signed image URLs, making it look like normal browser activity&lt;br/&gt;⚠️ Any AI assistant with deep system access, Microsoft 365 Copilot, Google Gemini, all of them, is a potential exfiltration channel if untrusted content can reach its instruction stream&lt;br/&gt;&lt;br/&gt;We&amp;#39;ve spent years teaching developers not to trust user input. Now we&amp;#39;re handing AI tools full repo access and letting them ingest unvalidated text from pull requests.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-exploit-github-copilot-flaw/&#34;&gt;https://cybersecuritynews.com/hackers-exploit-github-copilot-flaw/&lt;/a&gt;&lt;br/&gt;#CyberSecurity #AI #GitHubCopilot #security #privacy #cloud #infosec #software
    </content>
    <updated>2026-04-14T18:14:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs907yeu2p7kz80zwl9gej0326qv3v78ztustq4tmh7m35frvudscczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw7tsh9k</id>
    
      <title type="html">A startup is putting military-style drones in high school ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs907yeu2p7kz80zwl9gej0326qv3v78ztustq4tmh7m35frvudscczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw7tsh9k" />
    <content type="html">
      A startup is putting military-style drones in high school ceilings. Ceiling-mounted. Charging. Waiting. And when something happens, a pilot in Austin, Texas, decides whether to deploy pepper gel on your kid&amp;#39;s school. I&amp;#39;m not saying the problem isn&amp;#39;t real. It absolutely is. But read that back.... in schools. We&amp;#39;ve taken a Ukrainian battlefield tactic against Russian soldiers and ported it to Deltona High School in Florida. The co-founder literally said the idea came from watching drone videos of the war in Ukraine. The chief pilot described it as &amp;#34;cheating in a video game after you die.&amp;#34; These are children.&lt;br/&gt;&lt;br/&gt;Here&amp;#39;s what&amp;#39;s not in the headline:&lt;br/&gt;&lt;br/&gt;🔒 The drones use an encrypted connection — but the article notes they&amp;#39;re potentially vulnerable to cyberattack. A compromised drone in a crowded hallway isn&amp;#39;t a security tool; it&amp;#39;s a weapon pointed in the wrong direction.&lt;br/&gt;&lt;br/&gt;⚖️ Mithril reserves the right to act independently during an attack, without waiting for law enforcement. A private company operating remotely is making use-of-force decisions at a school. &lt;br/&gt;&lt;br/&gt;💰 Florida and Georgia approved $500K&#43; each for this. A group of Texas parents raised $200K more. That&amp;#39;s real money going to ceiling drones instead of mental health services, counselors, or de-escalation programs.&lt;br/&gt;&lt;br/&gt;The ACLU said it plainly: when force becomes a zero-risk remote action, it gets overused. Axon tried a Taser drone for schools in 2022, and its own ethics board killed it. Mithril is picking up where that got dropped.&lt;br/&gt;&lt;br/&gt;I teach cybersecurity. I&amp;#39;ve spent years in boardrooms helping organizations think through risk. And the risk calculus here isn&amp;#39;t just about whether the drone works. It&amp;#39;s about what we&amp;#39;re normalizing when we turn schools into drone-monitored combat zones and call it progress.&lt;br/&gt;&lt;br/&gt;&amp;#34;This is the future,&amp;#34; said the sheriff&amp;#39;s captain.&lt;br/&gt;&lt;br/&gt;I hope not.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.wsj.com/business/a-startup-is-supplying-drones-to-high-schools-a7800ade&#34;&gt;https://www.wsj.com/business/a-startup-is-supplying-drones-to-high-schools-a7800ade&lt;/a&gt;&lt;br/&gt;#SchoolSafety #Cybersecurity #Leadership #security #privacy #cloud #infosec&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/397/038/875/713/788/original/a609eb258cbd9d03.mp4&#34;&gt;&lt;/video&gt;&lt;br/&gt;
    </content>
    <updated>2026-04-13T10:58:25Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw7hc5qgutueyqdarjp4wel85x8pj6y2drvs0wl4lnyln78p2g7agzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwakgwcj</id>
    
      <title type="html">Meta paused work with a $10B AI data vendor after hackers ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw7hc5qgutueyqdarjp4wel85x8pj6y2drvs0wl4lnyln78p2g7agzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwakgwcj" />
    <content type="html">
      Meta paused work with a $10B AI data vendor after hackers poisoned an open-source Python library called LiteLLM and walked out with four terabytes of data. So, that&amp;#39;s bad. And the worst part? The stolen data might include the actual training methodologies that Meta, OpenAI, Anthropic, and Google paid billions to develop. Think about what that means. You can&amp;#39;t protect your crown jewels if they&amp;#39;re sitting inside a vendor who&amp;#39;s connected to your three biggest competitors, all sharing the same open-source tools, all exposed by the same 40-minute window on PyPI before anyone noticed.&lt;br/&gt;&lt;br/&gt;🎯 The attack chain here is worth understanding: hackers compromised a security scanner called Trivy, used that access to get credentials for a LiteLLM maintainer, then published two malicious package versions that lasted less than an hour before removal. Forty minutes. That&amp;#39;s all it took.&lt;br/&gt;&lt;br/&gt;💼 Mercor is not some sloppy startup. It&amp;#39;s 22-year-old founders, $500M annualized revenue, and clients at the very top of the AI industry. Sophistication doesn&amp;#39;t protect you from a poisoned dependency you never thought to audit.&lt;br/&gt;&lt;br/&gt;🔍 The question I&amp;#39;d be asking right now if I were a CISO at any of these labs isn&amp;#39;t &amp;#34;were we breached.&amp;#34; It&amp;#39;s &amp;#34;how many vendors in our training pipeline are running LiteLLM, and did we even know?&amp;#34;&lt;br/&gt;&lt;br/&gt;Most companies audit their own software. Almost nobody audits the software their vendors use to build the data they&amp;#39;re buying.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://thenextweb.com/news/meta-mercor-breach-ai-training-secrets-risk&#34;&gt;https://thenextweb.com/news/meta-mercor-breach-ai-training-secrets-risk&lt;/a&gt;&lt;br/&gt;#Cybersecurity #AIRisk #SupplyChainSecurity spc #security #privacy #cloud #infosec #ThirdPartyRisk&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/358/238/316/312/055/original/153b72223171bf97.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-04-06T14:30:16Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz3y5j7m8a6kcdvecnp4ng56zjj0eemps0ex3acjrz5nzyu5v3a3qzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwkukzut</id>
    
      <title type="html">I teach cybersecurity. And I genuinely don&amp;#39;t know what to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz3y5j7m8a6kcdvecnp4ng56zjj0eemps0ex3acjrz5nzyu5v3a3qzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwkukzut" />
    <content type="html">
      I teach cybersecurity. And I genuinely don&amp;#39;t know what to tell my students after this one. Federal reviewers spent years trying to get basic encryption documentation from Microsoft for its GCC High government cloud. They couldn&amp;#39;t get it. One reviewer called the system a &amp;#34;pile of spaghetti pies,&amp;#34; with data traveling from point A to point B the way you&amp;#39;d get from Chicago to New York: a bus to St. Louis, a ferry to Pittsburgh, and a flight to Newark. Each leg is a potential hijacking. They knew this. They said this out loud in writing. Then they approved it anyway in December 2024, because too many agencies were already using it. 🔐 That&amp;#39;s not a security review. That&amp;#39;s a hostage negotiation. Two things in this story should make every CISO and CIO uncomfortable:&lt;br/&gt;&lt;br/&gt;🧩 Microsoft built its federal cloud on top of decades of legacy code that it apparently can&amp;#39;t fully document itself&lt;br/&gt;👮 &amp;#34;Digital escorts&amp;#34; often ex-military with minimal software engineering backgrounds are the firewall between Chinese engineers working on the system and classified U.S. networks 🤦🏻‍♂️ &lt;br/&gt;&lt;br/&gt;The scariest line in the whole ProPublica investigation isn&amp;#39;t the &amp;#34;pile of shit&amp;#34; quote. It&amp;#39;s this: FedRAMP determined that refusing authorization wasn&amp;#39;t feasible because agencies were already using the product. Read that again. The security review process reached a conclusion based on sunk cost, not risk. Ex Post Facto Fallacy &lt;br/&gt;&lt;br/&gt;If that logic holds, the compliance framework is just documentation theater. And right now, CISA is being hollowed out, so there are fewer people left to even run the theater.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/&#34;&gt;https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/&lt;/a&gt;&lt;br/&gt;#Cybersecurity #Microsoft #FedRAMP #Leadership #RiskManagement #security #privacy #cloud #infosec
    </content>
    <updated>2026-03-29T23:52:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyk3wpf6f25mhwy39am0yqg3anfmufnu9pe3dzcmhs0hh5p62myhszyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw39vjrn</id>
    
      <title type="html">According to the recent Meta/YouTube verdict, the plaintiff ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyk3wpf6f25mhwy39am0yqg3anfmufnu9pe3dzcmhs0hh5p62myhszyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw39vjrn" />
    <content type="html">
      According to the recent Meta/YouTube verdict, the plaintiff started using YouTube at age 6 and Instagram at age 9. The jury deliberated 43 hours, answered &amp;#34;yes&amp;#34; to every negligence question, and found evidence of malice. Then Meta&amp;#39;s stock went up 0.7%. 🤔 That gap tells you everything. 📊&lt;br/&gt;&lt;br/&gt;The $6 million award is basically a rounding error for companies pulling in $350 billion in combined annual revenue. What actually matters is the 2,000 pending lawsuits this verdict just handed a roadmap to, and the federal trial coming in Oakland this summer. This is the first domino. The tobacco industry had the same &amp;#34;we&amp;#39;re being scapegoated&amp;#34; defense in 1994, and that argument eventually cost them $206 billion.&lt;br/&gt;&lt;br/&gt;Here&amp;#39;s what I keep thinking about as a guy who teaches about the legal, ethical, and social issues of information technology: the products we build have consequences we&amp;#39;re responsible for, whether we want to admit it or not. The jury didn&amp;#39;t care that Meta said Kaley&amp;#39;s home life was complicated. They cared that the autoplay kept going anyway. 🔁&lt;br/&gt;&lt;br/&gt;Two things can both be true: teen mental health is complex, and a notification engine designed to override a kid&amp;#39;s ability to stop scrolling is a design choice someone made.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.latimes.com/california/story/2026-03-25/social-media-lawsuit-trial-meta-google-verdict&#34;&gt;https://www.latimes.com/california/story/2026-03-25/social-media-lawsuit-trial-meta-google-verdict&lt;/a&gt;&lt;br/&gt;#ChildSafety #BigTech #Leadership #Accountability #SocialMedia #Ethics #DePaulUniversity #DePaulU &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub10crl4wj3quyxf3lqeyy6smzhtzk9m20qucr633ymwe33vawp398qx466l0&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;DePaul University&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub10cr…66l0&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;
    </content>
    <updated>2026-03-29T23:36:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2ucqccp5y8u6gk8lm3zaa86vvayjhs96lpa8a3h3dw6v40dmkrnczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw2fgelh</id>
    
      <title type="html">Oh boy. Stanford researchers scanned 10 million web pages and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2ucqccp5y8u6gk8lm3zaa86vvayjhs96lpa8a3h3dw6v40dmkrnczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw2fgelh" />
    <content type="html">
      Oh boy. Stanford researchers scanned 10 million web pages and found API keys just sitting in the public-facing code. That&amp;#39;s 1,748 active credentials from major providers exposed in live website code, mostly inside JavaScript files. Not in old test environments. Not in a forgotten repo. In the live, running site. Banks. Healthcare providers. &amp;#34;Not just small companies, but some very large companies,&amp;#34; according to the lead researcher. And some of those credentials had been sitting there for years. Not the first time I&amp;#39;ve seen something like this. 🤦🏻‍♂️  &lt;br/&gt;&lt;br/&gt;The thing is that most orgs are scanning their source code but not their deployed sites. 😳 Those are two different things, and most leaks originate during the build process. A key gets baked in somewhere between development and production, and nobody catches it because the scan already ran upstream. Meanwhile, GitGuardian counted over 28 million new hardcoded secrets exposed in public GitHub commits in 2025 alone.  This isn&amp;#39;t a one-time research finding it&amp;#39;s a systemic habit that needs to change.&lt;br/&gt;&lt;br/&gt;🔍 When did your team last scan the live site, not just the codebase?&lt;br/&gt;🏦 If you&amp;#39;re in a regulated industry, that question just became a compliance question too&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.newscientist.com/article/2520143-security-credentials-inadvertently-leaked-on-thousands-of-websites/&#34;&gt;https://www.newscientist.com/article/2520143-security-credentials-inadvertently-leaked-on-thousands-of-websites/&lt;/a&gt;&lt;br/&gt;#Cybersecurity #AppSec #Leadership #security #privacy #cloud #infosec
    </content>
    <updated>2026-03-29T23:07:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz6tgqp72xkdyjfqc9y5kedwgcuvtrn6hkazehcuj427gqakal3cczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwjxc4r5</id>
    
      <title type="html">🚨 The FCC bans all routers made outside the U.S. — So ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz6tgqp72xkdyjfqc9y5kedwgcuvtrn6hkazehcuj427gqakal3cczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwjxc4r5" />
    <content type="html">
      🚨 The FCC bans all routers made outside the U.S. — So basically all routers. &lt;br/&gt;&lt;br/&gt;Most people buy a router and never think about it again. That box in the corner that handles every password and video call you make. The FCC is now worried that some of these devices are actually open doors for foreign governments. Shocked! 🫢 &lt;br/&gt;&lt;br/&gt;Regulators are looking at TP-Link to see if they pose a threat to national security. Recent reports show hackers used these devices to build massive botnets. You might find yourself shopping for new hardware if these bans take effect.&lt;br/&gt;&lt;br/&gt;🧠 Regulators are weighing a ban on specific foreign routers.&lt;br/&gt;⚡ Security experts found flaws that allow remote access.&lt;br/&gt;🎓 This move follows previous restrictions on Chinese tech firms.&lt;br/&gt;🔍 Check your hardware brand before the new rules arrive.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://mashable.com/article/us-fcc-foreign-router-ban&#34;&gt;https://mashable.com/article/us-fcc-foreign-router-ban&lt;/a&gt;&lt;br/&gt;#FCC #Security #TechPolicy #security #privacy #cloud #infosec #cybersecurity
    </content>
    <updated>2026-03-24T14:13:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfzkez4nt727c5zqwqhut6kcyt3mkswews7f8vsh2nruzfwl7m07czyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw5l8s5n</id>
    
      <title type="html">🤦🏻‍♂️ Oh no... The line between a successful lunar ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfzkez4nt727c5zqwqhut6kcyt3mkswews7f8vsh2nruzfwl7m07czyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw5l8s5n" />
    <content type="html">
      🤦🏻‍♂️ Oh no... The line between a successful lunar mission and a $72 million piece of space junk can come down to a single line of code. 🚀 NASA’s Lunar Trailblazer mission just provided a painful lesson in systems engineering. Shortly after launch, a navigation glitch caused the spacecraft to lose its sense of direction. Instead of correcting its course, the onboard computer entered a loop that exhausted its entire fuel supply in less than a day. 😳&lt;br/&gt;&lt;br/&gt;This wasn&amp;#39;t a mechanical failure or a solar flare, it was a software error that prevented the craft from communicating with its own star trackers. When we build complex systems, we often focus on the big risks while ignoring the small, logical traps that can paralyze a machine. For the engineers who spent years on this project, it is a reminder that in space, there is no &amp;#34;undo&amp;#34; button for a bad update. 🌖&lt;br/&gt;&lt;br/&gt;🧠 A logic error caused the craft to misinterpret its orientation.&lt;br/&gt;⚡ The entire fuel reserve was spent trying to fix a non-existent course deviation.&lt;br/&gt;🎓 Recovery efforts failed because the craft could no longer point its antenna at Earth.&lt;br/&gt;🔍 This incident highlights the critical need for more robust hardware-in-the-loop testing.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://gizmodo.com/the-stupidest-glitch-imaginable-killed-a-72-million-lunar-mission-in-a-single-day-2000728962&#34;&gt;https://gizmodo.com/the-stupidest-glitch-imaginable-killed-a-72-million-lunar-mission-in-a-single-day-2000728962&lt;/a&gt;&lt;br/&gt;#Aerospace #SystemsEngineering #NASA #TechFailures #Vibecoding  #Fail #SoftwareDevelopment #Software
    </content>
    <updated>2026-03-12T13:16:20Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdlmqp3dy873mfdjrl9fesu3pk0s5msrku39ggl8su6h20v0p0yqqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwrnn2ep</id>
    
      <title type="html">Φ In the Phaedrus, Plato argued that the invention of writing ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdlmqp3dy873mfdjrl9fesu3pk0s5msrku39ggl8su6h20v0p0yqqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwrnn2ep" />
    <content type="html">
      Φ In the Phaedrus, Plato argued that the invention of writing would destroy our memory and replace true wisdom with a mere shadow of it. He believed that when we stop internalizing knowledge and start relying on external tools, we lose the ability to actually think. Thousands of years later, we are having the exact same conversation about Large Language Models and ChatGPT.&lt;br/&gt;&lt;br/&gt;The danger of AI is not that it will become too smart, but that it will make us too lazy to be wise. True education is what Plato called a turning of the soul, a difficult process that requires active engagement. If you let a machine summarize the world for you, you are only holding onto dead speech. We must treat writing and thinking as a practice of the mind rather than a task to be automated.&lt;br/&gt;&lt;br/&gt;🧠 Plato feared that external tools create the illusion of knowledge.&lt;br/&gt;⚡ Large Language Models offer quick results while bypassing understanding.&lt;br/&gt;🎓 Genuine insight comes from human dialectic and struggle.&lt;br/&gt;🔍 We must focus on literacy that teaches how these algorithms function.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.templeton.org/news/plato-warned-us-about-chatgpt-and-told-us-what-to-do-about-it&#34;&gt;https://www.templeton.org/news/plato-warned-us-about-chatgpt-and-told-us-what-to-do-about-it&lt;/a&gt;&lt;br/&gt;#ArtificialIntelligence #Philosophy #Learning #ChatGPT #Education #Teaching #AI #Technology
    </content>
    <updated>2026-03-04T01:13:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxrmwrl3pmm7sfqa0tsxnku647dxscsnncmv57dlmtgyuguz9jg4szyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwwzghme</id>
    
      <title type="html"> Apple designed Lockdown Mode for people facing grave threats, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxrmwrl3pmm7sfqa0tsxnku647dxscsnncmv57dlmtgyuguz9jg4szyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwwzghme" />
    <content type="html">
       Apple designed Lockdown Mode for people facing grave threats, but we&amp;#39;re seeing it work in practice against federal forensics. During a recent investigation into a journalist, the FBI reported that it was unable to extract any data from an iPhone because the feature was enabled. It is rare for a software setting to hold its own against professional, state-level tools. 🔒 The strength of this mode comes from how it drastically reduces the attack surface of the device. By disabling just-in-time JavaScript and blocking most message attachments, it removes the entry points that forensic tools like GrayKey typically exploit. It also forces the device into a state in which biometrics are disabled, requiring a passcode that often carries stronger legal protections during a search.&lt;br/&gt;&lt;br/&gt;🧠 Lockdown Mode specifically blocks wired data connections used by extraction hardware.&lt;br/&gt;⚡ The FBI confirmed in court filings that its Computer Analysis Response Team was blocked.&lt;br/&gt;🎓 Using this mode requires giving up features like shared photo albums and link previews.&lt;br/&gt;🔍 Apple offers a $2 million bounty for anyone who can bypass these specific protections.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://appleinsider.com/articles/26/02/04/iphone-lockdown-mode-will-protect-your-data-even-from-the-fbi&#34;&gt;https://appleinsider.com/articles/26/02/04/iphone-lockdown-mode-will-protect-your-data-even-from-the-fbi&lt;/a&gt;&lt;br/&gt;#Apple #CyberSecurity #DataPrivacy #InfoSec #security #privacy #cloud
    </content>
    <updated>2026-02-10T03:24:42Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswp8720y0psmay6h4pz0cc7a77cfesu9c7yqc5nhxc3zm2gtdmupczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwrdgqnm</id>
    
      <title type="html">🇫🇷 The French government is sending a message about digital ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswp8720y0psmay6h4pz0cc7a77cfesu9c7yqc5nhxc3zm2gtdmupczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwrdgqnm" />
    <content type="html">
      🇫🇷 The French government is sending a message about digital independence by ditching Microsoft Teams and Zoom for its own platform, Visio. This move is not about a lack of features but a calculated push for digital sovereignty. By 2027, every government department in France will communicate via this sovereign stack, ensuring that sensitive data remains subject to European law. The shift addresses a growing concern that relying on foreign cloud giants creates a strategic vulnerability. France is opting for an open-source architecture built on Django and React, hosted on the domestic Outscale cloud. This infrastructure removes the risk of external service disruptions while fostering a local tech ecosystem.&lt;br/&gt;&lt;br/&gt;🧠 The Visio platform integrates with Tchap, a secure messaging app based on the Matrix protocol.&lt;br/&gt;⚡ French startup Pyannote provides the AI backbone for meeting transcripts and speaker identification.&lt;br/&gt;🎓 The administration expects to save millions in annual licensing fees by using in-house software.&lt;br/&gt;🔍 Data remains strictly within French jurisdiction to bypass foreign data access laws.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://itsfoss.com/news/france-ditches-microsoft-teams-and-zoom/&#34;&gt;https://itsfoss.com/news/france-ditches-microsoft-teams-and-zoom/&lt;/a&gt;&lt;br/&gt;#France #TechHistory #DigitalSovereignty #OpenSource #security #privacy #cloud #infosec #cybersecurity #FOSS
    </content>
    <updated>2026-02-10T03:09:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdgq2y5cag3qlu83k9yf0ey2wyjlur92kx2qep7fgyrm25vueszgszyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwt8vhma</id>
    
      <title type="html">This Gmail hack is unsettling not because it’s flashy, but ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdgq2y5cag3qlu83k9yf0ey2wyjlur92kx2qep7fgyrm25vueszgszyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwt8vhma" />
    <content type="html">
      This Gmail hack is unsettling not because it’s flashy, but because it’s bureaucratic. Attackers aren’t breaking encryption or outsmarting algorithms. They’re filling out forms. By changing an account’s age and abusing Google’s Family Link feature, they can quietly reclassify an adult user as a “child” and assume parental control. At that point, the rightful owner isn’t hacked so much as administratively erased.&lt;br/&gt;&lt;br/&gt;The clever part is that everything happens inside legitimate features. Passwords are changed. Two-factor settings are altered. Recovery options are overwritten. And when the user tries to get back in, Google’s automated systems see a supervised child account and do exactly what they were designed to do: say no.&lt;br/&gt;&lt;br/&gt;Google says it’s looking into the issue, which suggests this wasn’t how the system was supposed to work. But it’s a reminder of an old lesson. Security failures often happen when protective mechanisms are combined in ways no one quite imagined. The tools aren’t broken. The assumptions are.&lt;br/&gt;&lt;br/&gt;There’s no dramatic fix here, only mildly annoying advice that suddenly feels urgent. Review recovery settings. Lock down account changes. Use passkeys. Because once an attacker controls the recovery layer, proving you’re you can become surprisingly difficult.&lt;br/&gt;&lt;br/&gt;TL;DR&lt;br/&gt;🧠 Family safety tools are being weaponized&lt;br/&gt;⚡ Account recovery can be shut down entirely&lt;br/&gt;🎓 Legitimate features enable the lockout&lt;br/&gt;🔍 Prevention matters more than appeals&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.forbes.com/sites/daveywinder/2025/12/07/google-looking-into-gmail-hack-locking-users-out-with-no-recovery&#34;&gt;https://www.forbes.com/sites/daveywinder/2025/12/07/google-looking-into-gmail-hack-locking-users-out-with-no-recovery&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#Cybersecurity #Gmail #IdentitySecurity #AccountRecovery #DigitalRisk #security #privacy #cloud #infosec&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/765/475/680/741/727/original/426b72113277ab41.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-12-22T22:02:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq5tzqmvumc49rq87m9vny72y8l04t3r83nz3mm5ma9x9vm3pcn5qzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw77xhfe</id>
    
      <title type="html">🤖 OpenAI’s move to give ChatGPT distinct personalities ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq5tzqmvumc49rq87m9vny72y8l04t3r83nz3mm5ma9x9vm3pcn5qzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw77xhfe" />
    <content type="html">
      🤖 OpenAI’s move to give ChatGPT distinct personalities (Friendly, Nerdy, Cynical, etc) via its new GPT-5.1 release is interesting because it signals that how we interact with AI is now as important as what it can do. On one hand that’s good as we want engagement. On the other, it’s risky with personality tweaks mean changes in behaviour, trust and expectations. For anyone using AI in enterprise or leadership roles (like me), the questions are: Do these presets enhance productivity or distract? Do they shift responsibility in surprising ways?&lt;br/&gt;&lt;br/&gt;📌 8 distinct personality modes introduced&lt;br/&gt;📌 Two models: Instant (warm) &#43; Thinking (deep)&lt;br/&gt;📌 Raises questions about tone, trust, alignment&lt;br/&gt;📌 Impacts enterprise use, leadership and responsibility&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.theverge.com/news/802653/openai-gpt-5-1-upgrade-personality-presets&#34;&gt;https://www.theverge.com/news/802653/openai-gpt-5-1-upgrade-personality-presets&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#AI #Leadership #Innovation #Ethics #security #privacy #cloud #infosec #cybersecurity
    </content>
    <updated>2025-11-12T23:37:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswp4mt0ysk5mcpfk46ymykfq3l3k4q2wwlsartu6w2ka4edy38f9qzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwzndqcx</id>
    
      <title type="html">As I&amp;#39;ve said for years, AI personhood isn’t a distant ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswp4mt0ysk5mcpfk46ymykfq3l3k4q2wwlsartu6w2ka4edy38f9qzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwzndqcx" />
    <content type="html">
      As I&amp;#39;ve said for years, AI personhood isn’t a distant thought experiment; it’s an approaching policy crisis. 🤖 The Guardian’s Jacy Reese Anthis argues that digital minds will soon force us to rethink “who” counts as a person under law. 20% of Americans already believe some AIs are sentient; 38% say those systems should have rights. We’ve barely handled the social fallout of the internet, yet we’re racing toward coexistence with entities that can learn, plan, and act independently. The question isn’t just how we will treat them, it’s how they will treat us. 😳 If we wait until AI self-improvement loops kick in, we’ll be spectators, not stewards. The sociology and philosophy of AI, not just the engineering, will decide whether we coexist or get sidelined. ɸ&lt;br/&gt;&lt;br/&gt;🧠 20% already see AI as sentient&lt;br/&gt;⚖️ Legal &amp;amp; moral personhood debates rising&lt;br/&gt;🚨 Policy &amp;amp; sociology trail behind tech&lt;br/&gt;💡 Prepare now — before acceleration hits&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.theguardian.com/commentisfree/2025/sep/30/artificial-intelligence-personhood&#34;&gt;https://www.theguardian.com/commentisfree/2025/sep/30/artificial-intelligence-personhood&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#AI #Ethics #Governance #FutureOfAI #TheMatrix #Data #Lore #TNG #Personhood #Philosophy
    </content>
    <updated>2025-11-06T20:25:47Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8v0qwwk6d7rr4n28l67u98qnsfshyfukksatw44wnqchfgweunuszyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwlc2fga</id>
    
      <title type="html">🤦🏻‍♂️ Well, it was probably inevitable that the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8v0qwwk6d7rr4n28l67u98qnsfshyfukksatw44wnqchfgweunuszyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwlc2fga" />
    <content type="html">
      🤦🏻‍♂️  Well, it was probably inevitable that the &amp;#34;Internet of Things&amp;#34; would eventually make its way into the toilet bowl. Kohler&amp;#39;s new camera analyzes your waste for &amp;#39;health insights&amp;#39;, which sounds futuristic, but the security questions are concerning. It uses a fingerprint sensor ? to tie sensitive health data directly to an individual, then sends it to the cloud. While they promise encryption, we&amp;#39;re creating a honeypot 😬 of incredibly personal information that&amp;#39;s ripe for misuse. 💩&lt;br/&gt;&lt;br/&gt;TL;DR&lt;br/&gt;📸 Kohler is selling a $599 toilet camera, the Dekoda, to monitor your gut health. 💩&lt;br/&gt;👆 It uses a fingerprint scanner to link the health data it collects directly to you.&lt;br/&gt;🔐 The company claims end-to-end encryption, but this is still an unnervingly specific and sensitive dataset to have stored on any server.&lt;br/&gt;💰 On top of the hardware cost, it also requires a subscription, creating another recurring data transaction.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://techcrunch.com/2025/10/19/kohler-unveils-a-camera-for-your-toilet/&#34;&gt;https://techcrunch.com/2025/10/19/kohler-unveils-a-camera-for-your-toilet/&lt;/a&gt;&lt;br/&gt;#IoT #Privacy #DataSecurity #HealthTech #security #privacy #cloud #infosec #cybersecurity #PoopPictures
    </content>
    <updated>2025-10-20T00:28:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs03htvrfzcc53ua4n9jg796u8x8ufz3u5xnkad8ny2fcf3nazfqlczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw2qmk95</id>
    
      <title type="html">Hackers can steal 2FA codes and private messages from Android ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs03htvrfzcc53ua4n9jg796u8x8ufz3u5xnkad8ny2fcf3nazfqlczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw2qmk95" />
    <content type="html">
      Hackers can steal 2FA codes and private messages from Android phones. The &amp;#34;Pixnapping&amp;#34; attack is a really clever piece of research. It shows that the theoretical wall between apps on your phone isn&amp;#39;t as solid as we&amp;#39;d like to believe. By exploiting a GPU side channel, a malicious app with zero permissions can effectively screenshot other apps, one pixel at a time. It&amp;#39;s a reminder that security is a stack, and a vulnerability at the hardware level can undermine everything built on top of it.&lt;br/&gt;&lt;br/&gt;TL;DR&lt;br/&gt;👾 A new attack called &amp;#34;Pixnapping&amp;#34; can read visual data from other apps on Android devices.&lt;br/&gt;🔑 It exploits a GPU side-channel leak to steal sensitive info like 2FA codes and messages, pixel by pixel.&lt;br/&gt;⚠️ The scary part: the malicious app required for the attack needs zero special permissions to be granted.&lt;br/&gt;🧠 While complex to pull off, this is a serious proof of concept that challenges the core idea of OS app sandboxing.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/&#34;&gt;https://arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/&lt;/a&gt;&lt;br/&gt;#Android #Cybersecurity #SideChannelAttack #2FA #security #privacy #cloud #infosec
    </content>
    <updated>2025-10-14T18:42:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9d6usdewmwkz7z686t8kdshrt8s0np8p42axxx7y4lpv77kvcckgzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwr42q9t</id>
    
      <title type="html">Tilly Norwood — the so-called “AI actress” — feels less ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9d6usdewmwkz7z686t8kdshrt8s0np8p42axxx7y4lpv77kvcckgzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwr42q9t" />
    <content type="html">
      Tilly Norwood — the so-called “AI actress” — feels less like progress and more like propaganda. The rollout isn’t about art or tech; it’s about softening the idea that gen AI belongs in Hollywood as a replacement for people. What’s creepy is how it’s marketed: “agents are interested,” “she could be the next Scarlett Johansson.” The goal isn’t to sell a movie. It’s to sell the inevitability that AI will be the new normal. 🤖 Beneath the buzz, Tilly’s still a digital puppet needing human handlers. The only real actors here are the execs trying to convince us this is the future of storytelling.&lt;br/&gt;&lt;br/&gt;TL;DR&lt;br/&gt;&lt;br/&gt;🎭 Not an actress, a digital puppet&lt;br/&gt;&lt;br/&gt;⚙️ “AI actors” = PR stunt, not progress&lt;br/&gt;&lt;br/&gt;🧠 Normalization is the real goal&lt;br/&gt;&lt;br/&gt;⚠️ SAG-AFTRA’s concerns are the story&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.theverge.com/ai-artificial-intelligence/791680/tilly-norwood-particle6-xicoia-eline-van-der-velden&#34;&gt;https://www.theverge.com/ai-artificial-intelligence/791680/tilly-norwood-particle6-xicoia-eline-van-der-velden&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#AI #Hollywood #Ethics #FutureOfWork #security #privacy #cloud #infosec #cybersecurity #deepfakes
    </content>
    <updated>2025-10-08T18:48:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8pgqkxrvhev8fwh7dsuwz25ss2lt29vug4j8hw0dz5d2xk7vkyeqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwawfd9d</id>
    
      <title type="html">If this reporting holds, someone rewrote federal workers’ ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8pgqkxrvhev8fwh7dsuwz25ss2lt29vug4j8hw0dz5d2xk7vkyeqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwawfd9d" />
    <content type="html">
      If this reporting holds, someone rewrote federal workers’ out-of-office replies to pin the shutdown on Democrats. That is not just gross, it drags civil service comms into campaign work. Even if you think the message is true, hijacking employee autoresponders crosses a line.&lt;br/&gt;&lt;br/&gt;TL;DR&lt;br/&gt;🔎 Wired reports OOO replies were changed without consent&lt;br/&gt;⚖️ Hatch Act questions are very real here&lt;br/&gt;🧑‍💼 Staff tried to revert and saw changes return&lt;br/&gt;🛡️ Keep outage comms neutral and logged, not political&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.wired.com/story/government-workers-say-their-out-of-office-replies-were-forcibly-changed-to-blame-democrats-for-shutdown/&#34;&gt;https://www.wired.com/story/government-workers-say-their-out-of-office-replies-were-forcibly-changed-to-blame-democrats-for-shutdown/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#Security #GovTech #Ethics #PublicSector #Governance
    </content>
    <updated>2025-10-02T21:32:44Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsphc65mmrr7zkq4vxslxp6kmwgj3vfmem6jaqrfrnus82u69zchzgzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwygyn4g</id>
    
      <title type="html">🤖 Most people still treat AI chatbots like a private ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsphc65mmrr7zkq4vxslxp6kmwgj3vfmem6jaqrfrnus82u69zchzgzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwygyn4g" />
    <content type="html">
      🤖 Most people still treat AI chatbots like a private confessional, but they aren’t. 😳 Every question is logged, stored, and potentially discoverable, sometimes even after you’ve deleted it. OpenAI, Google, and Anthropic all retain user prompts by default, often under the guise of “memory” or “service improvement.” &lt;br/&gt;&lt;br/&gt;And here’s the kicker: a federal court order now forces OpenAI to preserve all ChatGPT conversations, including “Temporary” ones users assumed were erased. So the notion of ephemeral chats is gone. That should change how people think about what they type into these systems.&lt;br/&gt;&lt;br/&gt;The bigger issue is that the line between “helpful personalization” and “permanent surveillance record” is blurring fast. What looks convenient today could look like an exposure tomorrow.&lt;br/&gt;&lt;br/&gt;TL;DR&lt;br/&gt;⚠️ AI queries are logged&lt;br/&gt;🔐 Deleted chats still saved&lt;br/&gt;🧠 “Memory” is default setting&lt;br/&gt;📂 Court orders enforce retention&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.theregister.com/2025/08/18/opinion_column_ai_surveillance/&#34;&gt;https://www.theregister.com/2025/08/18/opinion_column_ai_surveillance/&lt;/a&gt;&lt;br/&gt;#AI #Privacy #DataSecurity #Surveillance #FRCP #EDRM #security #privacy #cloud #infosec #cybersecurity #LegalHold
    </content>
    <updated>2025-08-18T16:48:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv6js2ra3adrnrgtmpxdyvdrceccvf6t7dm0s4pf22aa0dvt8q8vczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwwg3vxt</id>
    
      <title type="html">🔐 A VPN can improve your privacy, or just give you a false ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv6js2ra3adrnrgtmpxdyvdrceccvf6t7dm0s4pf22aa0dvt8q8vczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwwg3vxt" />
    <content type="html">
      🔐 A VPN can improve your privacy, or just give you a false sense of it. The EFF’s guide is a solid reminder that choosing a VPN is less about speed or price, and more about who runs it, what they log, and whether they actually deliver the protection they claim.&lt;br/&gt;&lt;br/&gt;TL;DR&lt;br/&gt;🧠 VPNs don’t guarantee anonymity&lt;br/&gt;📜 “No logs” claims often lack proof&lt;br/&gt;👤 Your threat model shapes your VPN needs&lt;br/&gt;🔎 Look into ownership and reputation&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://ssd.eff.org/module/choosing-vpn-thats-right-you&#34;&gt;https://ssd.eff.org/module/choosing-vpn-thats-right-you&lt;/a&gt;&lt;br/&gt;#cybersecurity #privacy #vpn #digitalrights #security #privacy #cloud #infosec #EFF &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1m24qfk8mead3xy9d3ctx9amt6f74ukepdqca9eey4mgn2502ynfsujd9a3&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Electronic Frontier Foundation&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1m24…d9a3&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;
    </content>
    <updated>2025-08-01T21:44:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsftdrhwxn7fd0wr3wp9v5v2w35lcyfd6qqp70tktd668rlg2ecg3qzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwd040l4</id>
    
      <title type="html">🧠 Philosophy Eats AI — and it should ϕ According to MIT ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsftdrhwxn7fd0wr3wp9v5v2w35lcyfd6qqp70tktd668rlg2ecg3qzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwd040l4" />
    <content type="html">
      🧠 Philosophy Eats AI — and it should ϕ According to MIT Sloan, the rise of AI demands more than just coding skills. It calls for moral imagination and philosophical leadership.&lt;br/&gt;&lt;br/&gt;Why? Because AI is now shaping:&lt;br/&gt;⚖️ Justice systems and hiring decisions&lt;br/&gt;🧬 Healthcare outcomes and policy&lt;br/&gt;🔍 Surveillance, privacy, and autonomy&lt;br/&gt;💼 Corporate power and governance&lt;br/&gt;&lt;br/&gt;AI can’t govern itself — we must lead with wisdom.&lt;br/&gt;&lt;br/&gt;💬 What if your org’s next great AI investment isn’t tech... but ethics?&lt;br/&gt;&lt;br/&gt;#AIethics #Leadership #MoralImagination #ResponsibleAI #DigitalStrategy #Ethice #Philosophy &lt;br/&gt;&lt;a href=&#34;https://sloanreview.mit.edu/article/philosophy-eats-ai/&#34;&gt;https://sloanreview.mit.edu/article/philosophy-eats-ai/&lt;/a&gt;
    </content>
    <updated>2025-06-30T21:55:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8nqysg83kytc5f6jyj2t3ekst7ug2en2s3jsjrt56aztk6ylq0vqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwyp6nf4</id>
    
      <title type="html">🚨 184 MILLION passwords exposed — major data breach alert ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8nqysg83kytc5f6jyj2t3ekst7ug2en2s3jsjrt56aztk6ylq0vqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwyp6nf4" />
    <content type="html">
      🚨 184 MILLION passwords exposed — major data breach alert 🚨&lt;br/&gt;&lt;br/&gt;A newly uncovered unprotected database has leaked credentials for Google, Microsoft, Facebook, Apple, financial accounts, and even government portals.&lt;br/&gt;Highlights:&lt;br/&gt;🔓 Plaintext — no encryption or password protection&lt;br/&gt;⚠️ Threats include credential stuffing, identity theft, corporate espionage, ransomware, and phishing&lt;br/&gt;🔑 Action steps:&lt;br/&gt;・Use a password manager &lt;br/&gt;・Use complex, unique passwords&lt;br/&gt;・Enable multi-factor authentication (MFA)&lt;br/&gt;・Check if your data was leaked (e.g., HaveIBeenPwned)&lt;br/&gt;・Deploy strong security software&lt;br/&gt;&lt;br/&gt;We can’t control every breach, but we can control our defenses. Stay vigilant, stay protected.&lt;br/&gt;&lt;br/&gt;#Cybersecurity #DataBreach #InfoSec #MFA #RiskManagement&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.zdnet.com/article/massive-data-breach-exposes-184-million-passwords-for-google-microsoft-facebook-and-more/&#34;&gt;https://www.zdnet.com/article/massive-data-breach-exposes-184-million-passwords-for-google-microsoft-facebook-and-more/&lt;/a&gt;
    </content>
    <updated>2025-05-26T17:58:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs29acjkzyltvrxj3hv00lmcvkuxd3sfan8ns663skmywrm9ecrqhszyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwsf32p9</id>
    
      <title type="html">⚖️ Montana just became the first U.S. state to ban law ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs29acjkzyltvrxj3hv00lmcvkuxd3sfan8ns663skmywrm9ecrqhszyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwsf32p9" />
    <content type="html">
      ⚖️ Montana just became the first U.S. state to ban law enforcement from purchasing personal data from brokers — and it’s a privacy milestone 🚫📱&lt;br/&gt;&lt;br/&gt;Under this new law:&lt;br/&gt;📍 Government agencies can’t buy sensitive data (location, biometrics, etc.) without a warrant&lt;br/&gt;🔍 It closes a major loophole used to sidestep Fourth Amendment protections&lt;br/&gt;📄 Agencies also can’t require people to waive rights through service terms&lt;br/&gt;🧱 It sets a precedent for digital due process in a data-saturated world&lt;br/&gt;&lt;br/&gt;This isn’t just a state law. It’s a model for what digital civil liberties legislation should look like nationwide.&lt;br/&gt;&lt;br/&gt;#Privacy #Surveillance #DigitalRights #DataBrokers #CyberLaw #security #cloud #infosec #cybersecurity &lt;br/&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2025/05/montana-becomes-first-state-close-law-enforcement-data-broker-loophole&#34;&gt;https://www.eff.org/deeplinks/2025/05/montana-becomes-first-state-close-law-enforcement-data-broker-loophole&lt;/a&gt;
    </content>
    <updated>2025-05-16T16:04:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst86h9vkskghy3hmyshznx3wzcgw3r896zn6dlyhgngm5398m4ltszyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwmsl4vy</id>
    
      <title type="html">🚀 Voyager 1 isn’t done yet — not even close 🧠🔧📡 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst86h9vkskghy3hmyshznx3wzcgw3r896zn6dlyhgngm5398m4ltszyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwmsl4vy" />
    <content type="html">
      🚀 Voyager 1 isn’t done yet — not even close 🧠🔧📡&lt;br/&gt;&lt;br/&gt;NASA just pulled off another miracle save:&lt;br/&gt;🛰️ The spacecraft’s primary roll thrusters, offline since 2004, were believed permanently dead&lt;br/&gt;🧯 With backup thrusters at risk of failure, JPL engineers gambled on a high-stakes heater reset&lt;br/&gt;🔥 If wrong, it could’ve caused a small onboard explosion&lt;br/&gt;📡 If right, it would restore control — 15.6 billion miles from Earth&lt;br/&gt;&lt;br/&gt;They were right. The thrusters fired. Voyager 1 can still hold its course.&lt;br/&gt;&lt;br/&gt;This wasn’t a reboot. It was old-school problem-solving, deep systems knowledge, and the audacity to trust an idea that might just work.&lt;br/&gt;&lt;br/&gt;The most distant human object is still flying — because a team believed it could.&lt;br/&gt;&lt;br/&gt;#Voyager1 #NASA #Space #Engineering #Resilience #DeepSpace&lt;br/&gt;&lt;a href=&#34;https://www.theregister.com/2025/05/15/voyager_1_survives_with_thruster_fix/&#34;&gt;https://www.theregister.com/2025/05/15/voyager_1_survives_with_thruster_fix/&lt;/a&gt;
    </content>
    <updated>2025-05-16T03:33:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspurwjdaz0x7wy0vsjeuvlsu004qsvr5zd2dd2ecreq5e9spak89szyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwnv0zp7</id>
    
      <title type="html">A recent case shows the critical need for vigilance in the age of ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspurwjdaz0x7wy0vsjeuvlsu004qsvr5zd2dd2ecreq5e9spak89szyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwnv0zp7" />
    <content type="html">
      A recent case shows the critical need for vigilance in the age of AI. ⚖️ A judge has slammed lawyers for submitting AI-generated research that included fabricated case citations. This raises serious questions about the reliability of AI in legal practice and the ethical responsibilities of legal professionals.&lt;br/&gt;&lt;br/&gt;💡 Key Takeaways:&lt;br/&gt;👉 AI tools can be helpful, but human oversight is essential.&lt;br/&gt;🛡️ Lawyers, ney EVERYONE must verify all information, regardless of the source.&lt;br/&gt;📚 The legal profession is adapting to AI, but core responsibilities remain.&lt;br/&gt;🚨 This serves as a cautionary tale for all professionals using AI.&lt;br/&gt;&lt;br/&gt;What are your thoughts on the role of AI in the legal field? &lt;br/&gt;#AI #LegalTech #Innovation #Ethics #Law #CyberSecurity&lt;br/&gt;&lt;a href=&#34;https://www.theverge.com/news/666443/judge-slams-lawyers-ai-bogus-research&#34;&gt;https://www.theverge.com/news/666443/judge-slams-lawyers-ai-bogus-research&lt;/a&gt;
    </content>
    <updated>2025-05-14T00:15:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswzu35062x4huq2ed60wqnqeh52eptkdcnfm4h0lmw6ducmussarqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw9m9net</id>
    
      <title type="html">ditto. This kind of thing pisses me off. It’s incredibly ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswzu35062x4huq2ed60wqnqeh52eptkdcnfm4h0lmw6ducmussarqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjw9m9net" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxk74vecsw04n753e5nlzdpk9chmvlu6l2kcsr2nnl8adhnzyw86qycv4jr&#39;&gt;nevent1q…v4jr&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;ditto. This kind of thing pisses me off. It’s incredibly wasteful to say the least.
    </content>
    <updated>2025-04-26T02:30:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxkfs2cnsq6ktnffzndaznsutts3h30d3d74m3ys3n0dmhnuc2nkczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwm6t50p</id>
    
      <title type="html">⚠️ Consumer tech alert: Google sunsets support for first-gen ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxkfs2cnsq6ktnffzndaznsutts3h30d3d74m3ys3n0dmhnuc2nkczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwm6t50p" />
    <content type="html">
      ⚠️ Consumer tech alert: Google sunsets support for first-gen Nest thermostats 🏠🛑&lt;br/&gt;&lt;br/&gt;Google announced that by 2026:&lt;br/&gt;🔥 Early Nest devices will lose key features&lt;br/&gt;🔒 Security updates will stop&lt;br/&gt;📱 Remote access via apps will be restricted&lt;br/&gt;💸 Customers are expected to migrate to newer models&lt;br/&gt;&lt;br/&gt;🤬 🤬🤬 🤬🤬 🤬&lt;br/&gt;&lt;br/&gt;The decision raises important questions about the true lifespan of smart home devices — and what consumers can reasonably expect from their tech investments.&lt;br/&gt;&lt;br/&gt;Trust matters. So does planned obsolescence.&lt;br/&gt;&lt;br/&gt;#SmartHome #Nest #Google #DeviceLifecycle #TechNews&lt;br/&gt;&lt;a href=&#34;https://www.theverge.com/news/656332/google-ending-support-nest-thermostats&#34;&gt;https://www.theverge.com/news/656332/google-ending-support-nest-thermostats&lt;/a&gt;
    </content>
    <updated>2025-04-26T01:34:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgplvys6xe9fkzx0ztwznc64ye3a2vwh6pw29uxlk57mvmndt9m3qzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwsmsqf6</id>
    
      <title type="html">⚠️ Major AI data breach: DeepSeek leaks 1M&#43; records to the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgplvys6xe9fkzx0ztwznc64ye3a2vwh6pw29uxlk57mvmndt9m3qzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwsmsqf6" />
    <content type="html">
      ⚠️ Major AI data breach: DeepSeek leaks 1M&#43; records to the Dark Web 🧠💥&lt;br/&gt;&lt;br/&gt;China-based AI startup DeepSeek just exposed a staggering volume of sensitive data:&lt;br/&gt;💬 1M&#43; chat logs&lt;br/&gt;🔐 API keys, backend metadata&lt;br/&gt;📡 Unencrypted traffic via iOS app (ATS disabled)&lt;br/&gt;🔓 Open ClickHouse database with full control&lt;br/&gt;&lt;br/&gt;This wasn’t just a lapse — it was a floodgate.&lt;br/&gt;&lt;br/&gt;🛡️ AI companies (and anyone integrating LLMs) must:&lt;br/&gt;🔍 Audit storage configs&lt;br/&gt;🔐 Enforce secure transport policies&lt;br/&gt;📊 Monitor for unintentional data exposure&lt;br/&gt;&lt;br/&gt;The future of AI relies on building trust. That starts with securing it.&lt;br/&gt;&lt;br/&gt;#AI #CyberSecurity #DataBreach #DarkWeb #InfoSec&lt;br/&gt;&lt;a href=&#34;https://www.darkreading.com/cyberattacks-data-breaches/deepseek-breach-opens-floodgates-dark-web&#34;&gt;https://www.darkreading.com/cyberattacks-data-breaches/deepseek-breach-opens-floodgates-dark-web&lt;/a&gt;
    </content>
    <updated>2025-04-23T03:38:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf8trrvmrerwwu0z0nvujm87l8wk55c2uwm4egaumhusp6nzqwqnqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwd9xqp4</id>
    
      <title type="html">🚨 Explosive allegations are hitting Elon Musk’s DOGE team. A ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf8trrvmrerwwu0z0nvujm87l8wk55c2uwm4egaumhusp6nzqwqnqzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwd9xqp4" />
    <content type="html">
      🚨 Explosive allegations are hitting Elon Musk’s DOGE team.&lt;br/&gt;&lt;br/&gt;A whistleblower says:&lt;br/&gt;📂 10GB of NLRB data was exfiltrated&lt;br/&gt;🔓 Security settings were disabled&lt;br/&gt;📸 Photos of staff were used to intimidate&lt;br/&gt;⚖️ Claims involve surveillance, union suppression, and cyber intrusion&lt;br/&gt;&lt;br/&gt;Musk called it “insane,” but the NLRB is reportedly cooperating with federal investigations. Whether true or not — this underscores the growing overlap of cybersecurity, labor rights, and executive power.&lt;br/&gt;&lt;br/&gt;#CyberSecurity #Whistleblower #ElonMusk #NLRB #DigitalEthics #security #privacy #cloud #infosec &lt;br/&gt;&lt;a href=&#34;https://www.npr.org/2025/04/15/nx-s1-5355896/doge-nlrb-elon-musk-spacex-security&#34;&gt;https://www.npr.org/2025/04/15/nx-s1-5355896/doge-nlrb-elon-musk-spacex-security&lt;/a&gt;
    </content>
    <updated>2025-04-16T01:02:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxkd9qshrcjf26eayc074frzhk48403hxtw9yh4susya2nqnamxeczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwlxt5rw</id>
    
      <title type="html">🚨 Florida’s new “Social Media Use by Minors” bill (SB ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxkd9qshrcjf26eayc074frzhk48403hxtw9yh4susya2nqnamxeczyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwlxt5rw" />
    <content type="html">
      🚨 Florida’s new “Social Media Use by Minors” bill (SB 868/HB 743) has a chilling twist: it demands platforms create backdoors to decrypt private messages.&lt;br/&gt;&lt;br/&gt;That means:&lt;br/&gt;🔓 End-to-end encryption may be turned off&lt;br/&gt;📵 Disappearing messages could be banned&lt;br/&gt;🧒 Minors lose digital privacy&lt;br/&gt;💣 All users may face weaker security&lt;br/&gt;&lt;br/&gt;EFF warns this is a dangerous precedent that risks everyone’s online safety. Legislating away encryption doesn’t protect kids — it jeopardizes all of us.&lt;br/&gt;&lt;br/&gt;#Cybersecurity #Privacy #Encryption #TechPolicy&lt;br/&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2025/04/floridas-new-social-media-bill-says-quiet-part-out-loud-and-demands-encryption&#34;&gt;https://www.eff.org/deeplinks/2025/04/floridas-new-social-media-bill-says-quiet-part-out-loud-and-demands-encryption&lt;/a&gt;
    </content>
    <updated>2025-04-13T20:48:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqztnnx7ne8quvc94fv4k43yjgdsz9n6ysmjvl8ncanecf23wtlkgzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwkvlkna</id>
    
      <title type="html">🚨 AI Code Assistants: A Double-Edged Sword? 🚨 AI-powered ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqztnnx7ne8quvc94fv4k43yjgdsz9n6ysmjvl8ncanecf23wtlkgzyqzatrvm7l9dcunak3344l39hkhyftptqu3l0xw9uvdag8wjrkyjwkvlkna" />
    <content type="html">
      🚨 AI Code Assistants: A Double-Edged Sword? 🚨&lt;br/&gt;&lt;br/&gt;AI-powered coding tools are revolutionizing development workflows, but they come with hidden dangers:&lt;br/&gt;&lt;br/&gt;🔹 Hallucinated Dependencies: AI suggests packages that don’t exist.&lt;br/&gt;🔹 Slopsquatting Attacks: Malicious actors register these fake packages, leading to potential security breaches.&lt;br/&gt;🔹 Automated Installation Risks: Some AI agents might auto-install these without developer awareness.&lt;br/&gt;🔹 False Legitimacy: AI-generated summaries can falsely validate these malicious packages.&lt;br/&gt;&lt;br/&gt;🛡️ Stay Vigilant: Always double-check AI-generated code and dependencies. Trust, but verify.&lt;br/&gt;&lt;br/&gt;#AI #CyberSecurity #DevSecOps #SupplyChain #SoftwareDevelopment&lt;br/&gt;&lt;a href=&#34;https://www.theregister.com/2025/04/12/ai_code_suggestions_sabotage_supply_chain&#34;&gt;https://www.theregister.com/2025/04/12/ai_code_suggestions_sabotage_supply_chain&lt;/a&gt;
    </content>
    <updated>2025-04-12T22:34:34Z</updated>
  </entry>

</feed>