RSS 생중계
India's Top Court Angry After Junior Judge Cites Fake AI-Generated Orders
Read more of this story at Slashdot.
Apple Launches New M5 Chips, MacBook Pro, and First New Monitors In Years
Read more of this story at Slashdot.
CBP Tapped Into the Online Advertising Ecosystem To Track Peoples’ Movements (404 Media)
Specifically, CBP says the data was in part sourced via real-time bidding, or RTB. Whenever an advertisement is displayed inside an app, a near instantaneous bidding process happens with companies vying to have their advert served to a certain demographic. A side effect of this is that surveillance firms, or rogue advertising companies working on their behalf, can observe this process and siphon information about mobile phones, including their location. All of this is essentially invisible to an ordinary phone user, but happens constantly.
We should note that the minimal advertising shown on LWN is not delivered via this bidding system.
AI-Generated Art Can't Be Copyrighted After Supreme Court Declines To Review the Rule
Read more of this story at Slashdot.
[$] Free software needs free tools
One of the contradictions of the modern open-source movement is that projects which respect user freedoms often rely on proprietary tools that do not: communities often turn to non-free software for code hosting, communication, and more. At Configuration Management Camp (CfgMgmtCamp) 2026, Jan Ainali spoke about the need for open-source projects to adopt open tools; he hoped to persuade new and mature projects to switch to open alternatives, even if just one tool, to reduce their dependencies on tech giants and support community-driven infrastructure.
ChatGPT Uninstalls Surged By 295% After Pentagon Deal
Read more of this story at Slashdot.
Garrett: To update blobs or not to update blobs
I trust my CPU vendor. I don't trust my CPU vendor because I want to, I trust my CPU vendor because I have no choice. I don't think it's likely that my CPU vendor has designed a CPU that identifies when I'm generating cryptographic keys and biases the RNG output so my keys are significantly weaker than they look, but it's not literally impossible. I generate keys on it anyway, because what choice do I have? At some point I will buy a new laptop because Electron will no longer fit in 32GB of RAM and I will have to make the same affirmation of trust, because the alternative is that I just don't have a computer.
Security updates for Tuesday
Hacked Tehran Traffic Cameras Fed Israeli Intelligence Before Strike On Khamenei
Read more of this story at Slashdot.
Amazon Cloud Unit's Data Centers In UAE, Bahrain Damaged In Drone Strikes
Read more of this story at Slashdot.
The 19th Century Silent Film That First Captured a Robot Attack
Read more of this story at Slashdot.
Superagers' 'Secret Ingredient' May Be the Growth of New Brain Cells
Read more of this story at Slashdot.
Iowa County Rolls Out Extensive Zoning Rules For Data Centers
Read more of this story at Slashdot.
British Columbia To End Time Changes, Adopt Year-Round Daylight Time
Read more of this story at Slashdot.
Apple Might Use Google Servers To Store Data For Its Upgraded AI Siri
Read more of this story at Slashdot.
[$] The ongoing quest for atomic buffered writes
HBO Max and Paramount+ To Merge Into One Streaming Service
Read more of this story at Slashdot.
Charter Gets FCC Permission To Buy Cox, Become Largest ISP In the US
Read more of this story at Slashdot.
Høiland-Jørgensen: The inner workings of TCP zero-copy
Since the memory is being copied directly from userspace to the network device, the userspace application has to keep it around unmodified, until it has finished sending. The sendmsg() syscall itself is asynchronous, and will return without waiting for this. Instead, once the memory buffers are no longer needed by the stack, the kernel will return a notification to userspace that the buffers can be reused.
Microsoft Bans 'Microslop' On Its Discord, Then Locks the Server
Read more of this story at Slashdot.
