[-] ForgottenFlux@lemmy.world 21 points 1 hour ago

Summary:

  • The author expresses dissatisfaction with the commercial and impersonal feel of modern Windows operating systems.
  • Past versions of Windows were disconnected and resilient, providing a more personal user experience.
  • Advertising integration in Windows has made it feel cheaper and less user-friendly.
  • Updates, intrusive changes, settings modifications, and lack of control are common issues plaguing modern Windows systems.
  • The author compares the current Windows experience to the offline glory days of Windows, highlighting the shift in user experience.
  • Windows now includes advertising, which some users find intrusive and unwanted.
  • Updates on Windows often lead to issues, with users experiencing broken computers after updates.
  • Users complain about settings changing after updates, impacting their preferences and privacy settings.
  • The author switched to macOS due to technical issues with Windows updates, appreciating the user experience on macOS.
  • Linux is praised for respecting its users by providing the operating system for free without intrusive ads.
  • The author hopes for a future version of Windows that offers more user control and less interference from Microsoft's software-as-a-service products.
48
[-] ForgottenFlux@lemmy.world 91 points 19 hours ago

Summary:

  • The FTC is investigating PC manufacturers for using "warranty void if removed" labels to discourage consumers from exercising their right to repair.
  • ASRock, Gigabyte, and Zotac received letters from the FTC regarding these practices.
  • The FTC is concerned about manufacturers denying warranty coverage based on these provisions.
  • The federal Magnuson-Moss Warranty Act is being invoked to prevent companies from making misleading warranties.
  • The Act prohibits conditioning warranties on the use of specific repair services unless provided for free or with a waiver from the FTC.
  • The FTC plans to review the written warranties and promotional materials of the companies after 30 days.
  • In the past, Nintendo, Sony, Microsoft, Asus, HTC, and Hyundai were also warned by the FTC for similar practices.
476
[-] ForgottenFlux@lemmy.world 13 points 23 hours ago

Summary:

  • Telegram founder Pavel Durov claimed in an interview that the company only employs "about 30 engineers."
  • Security experts say this is a major red flag for Telegram's cybersecurity, as it suggests the company lacks the resources to effectively secure its platform and fight off hackers.
  • Telegram's chats are not end-to-end encrypted by default, unlike more secure messaging apps like Signal or WhatsApp. Users have to manually enable the "Secret Chat" feature to get end-to-end encryption.
  • Telegram also uses its own proprietary encryption algorithm, which has raised concerns about its security.
  • As a social media platform with nearly 1 billion users, Telegram is an attractive target for both criminal and government hackers, but it seems to have very limited staff dedicated to cybersecurity.
  • Security experts have long warned that Telegram should not be considered a truly secure messaging app, and Durov's recent statement may indicate that the situation is worse than previously thought.
173
153
818
169

The cable industry has been in a nose-dive for years. Comcast's Q1 2024 earnings report showed its cable business losing 487,000 subscribers. The cable giant ended 2022 with 16,142,000 subscribers; in January, it had 13,600,000.

Charter, the only US cable company bigger than Comcast, is rapidly losing pay-TV subscribers, too. In its Q1 2024 earnings report, Charter reported losing 405,000 subscribers, including business accounts. It ended 2022 with 15,147,000 subscribers; at the end of March, it had 13,717,000.

And, like Comcast, Charter is looking to streaming bundles to keep its pay-TV business alive and to compete with the likes of YouTube TV and Hulu With Live TV.

It’s a curious time as cable TV providers scramble to be part of an industry created in reaction to business practices that many customers viewed as anti-consumer. Meanwhile, the streaming industry is adopting some of these same practices, like commercials and incessant price hikes, to establish profitability. And some smaller streaming players say it's nearly impossible to compete as the streaming industry's top players are taking form and, in some cases, collaborating.

But after decades of discouraging many subscribers with few alternatives, it will be hard for former or current cable customers to view firms like Comcast and Charter as trustworthy competitive streaming providers.

454

The EU Council has now passed a 4th term without passing its controversial message-scanning proposal. The just-concluded Belgian Presidency failed to broker a deal that would push forward this regulation, which has now been debated in the EU for more than two years.

For all those who have reached out to sign the “Don’t Scan Me” petition, thank you—your voice is being heard. News reports indicate the sponsors of this flawed proposal withdrew it because they couldn’t get a majority of member states to support it.

Now, it’s time to stop attempting to compromise encryption in the name of public safety. EFF has opposed this legislation from the start. Today, we’ve published a statement, along with EU civil society groups, explaining why this flawed proposal should be withdrawn.

The scanning proposal would create “detection orders” that allow for messages, files, and photos from hundreds of millions of users around the world to be compared to government databases of child abuse images. At some points during the debate, EU officials even suggested using AI to scan text conversations and predict who would engage in child abuse. That’s one of the reasons why some opponents have labeled the proposal “chat control.”

There’s scant public support for government file-scanning systems that break encryption. Nor is there support in EU law. People who need secure communications the most—lawyers, journalists, human rights workers, political dissidents, and oppressed minorities—will be the most affected by such invasive systems. Another group harmed would be those whom the EU’s proposal claims to be helping—abused and at-risk children, who need to securely communicate with trusted adults in order to seek help.

The right to have a private conversation, online or offline, is a bedrock human rights principle. When surveillance is used as an investigation technique, it must be targeted and coupled with strong judicial oversight. In the coming EU council presidency, which will be led by Hungary, leaders should drop this flawed message-scanning proposal and focus on law enforcement strategies that respect peoples’ privacy and security.

Further reading:

145

The EU Council has now passed a 4th term without passing its controversial message-scanning proposal. The just-concluded Belgian Presidency failed to broker a deal that would push forward this regulation, which has now been debated in the EU for more than two years.

For all those who have reached out to sign the “Don’t Scan Me” petition, thank you—your voice is being heard. News reports indicate the sponsors of this flawed proposal withdrew it because they couldn’t get a majority of member states to support it.

Now, it’s time to stop attempting to compromise encryption in the name of public safety. EFF has opposed this legislation from the start. Today, we’ve published a statement, along with EU civil society groups, explaining why this flawed proposal should be withdrawn.

The scanning proposal would create “detection orders” that allow for messages, files, and photos from hundreds of millions of users around the world to be compared to government databases of child abuse images. At some points during the debate, EU officials even suggested using AI to scan text conversations and predict who would engage in child abuse. That’s one of the reasons why some opponents have labeled the proposal “chat control.”

There’s scant public support for government file-scanning systems that break encryption. Nor is there support in EU law. People who need secure communications the most—lawyers, journalists, human rights workers, political dissidents, and oppressed minorities—will be the most affected by such invasive systems. Another group harmed would be those whom the EU’s proposal claims to be helping—abused and at-risk children, who need to securely communicate with trusted adults in order to seek help.

The right to have a private conversation, online or offline, is a bedrock human rights principle. When surveillance is used as an investigation technique, it must be targeted and coupled with strong judicial oversight. In the coming EU council presidency, which will be led by Hungary, leaders should drop this flawed message-scanning proposal and focus on law enforcement strategies that respect peoples’ privacy and security.

Further reading:

206

We’ve said it before: online age verification is incompatible with privacy. Companies responsible for storing or processing sensitive documents like drivers’ licenses are likely to encounter data breaches, potentially exposing not only personal data like users’ government-issued ID, but also information about the sites that they visit.

This threat is not hypothetical. This morning, 404 Media reported that a major identity verification company, AU10TIX, left login credentials exposed online for more than a year, allowing access to this very sensitive user data.

A researcher gained access to the company’s logging platform, “which in turn contained links to data related to specific people who had uploaded their identity documents,” including “the person’s name, date of birth, nationality, identification number, and the type of document uploaded such as a drivers’ license,” as well as images of those identity documents. Platforms reportedly using AU10TIX for identity verification include TikTok and X, formerly Twitter.

Lawmakers pushing forward with dangerous age verifications laws should stop and consider this report. Proposals like the federal Kids Online Safety Act and California’s Assembly Bill 3080 are moving further toward passage, with lawmakers in the House scheduled to vote in a key committee on KOSA this week, and California's Senate Judiciary committee set to discuss AB 3080 next week. Several other laws requiring age verification for accessing “adult” content and social media content have already passed in states across the country. EFF and others are challenging some of these laws in court.

In the final analysis, age verification systems are surveillance systems. Mandating them forces websites to require visitors to submit information such as government-issued identification to companies like AU10TIX. Hacks and data breaches of this sensitive information are not a hypothetical concern; it is simply a matter of when the data will be exposed, as this breach shows.

Data breaches can lead to any number of dangers for users: phishing, blackmail, or identity theft, in addition to the loss of anonymity and privacy. Requiring users to upload government documents—some of the most sensitive user data—will hurt all users.

According to the news report, so far the exposure of user data in the AU10TIX case did not lead to exposure beyond what the researcher showed was possible. If age verification requirements are passed into law, users will likely find themselves forced to share their private information across networks of third-party companies if they want to continue accessing and sharing online content. Within a year, it wouldn’t be strange to have uploaded your ID to a half-dozen different platforms.

No matter how vigilant you are, you cannot control what other companies do with your data. If age verification requirements become law, you’ll have to be lucky every time you are forced to share your private information. Hackers will just have to be lucky once.

212

We’ve said it before: online age verification is incompatible with privacy. Companies responsible for storing or processing sensitive documents like drivers’ licenses are likely to encounter data breaches, potentially exposing not only personal data like users’ government-issued ID, but also information about the sites that they visit.

This threat is not hypothetical. This morning, 404 Media reported that a major identity verification company, AU10TIX, left login credentials exposed online for more than a year, allowing access to this very sensitive user data.

A researcher gained access to the company’s logging platform, “which in turn contained links to data related to specific people who had uploaded their identity documents,” including “the person’s name, date of birth, nationality, identification number, and the type of document uploaded such as a drivers’ license,” as well as images of those identity documents. Platforms reportedly using AU10TIX for identity verification include TikTok and X, formerly Twitter.

Lawmakers pushing forward with dangerous age verifications laws should stop and consider this report. Proposals like the federal Kids Online Safety Act and California’s Assembly Bill 3080 are moving further toward passage, with lawmakers in the House scheduled to vote in a key committee on KOSA this week, and California's Senate Judiciary committee set to discuss AB 3080 next week. Several other laws requiring age verification for accessing “adult” content and social media content have already passed in states across the country. EFF and others are challenging some of these laws in court.

In the final analysis, age verification systems are surveillance systems. Mandating them forces websites to require visitors to submit information such as government-issued identification to companies like AU10TIX. Hacks and data breaches of this sensitive information are not a hypothetical concern; it is simply a matter of when the data will be exposed, as this breach shows.

Data breaches can lead to any number of dangers for users: phishing, blackmail, or identity theft, in addition to the loss of anonymity and privacy. Requiring users to upload government documents—some of the most sensitive user data—will hurt all users.

According to the news report, so far the exposure of user data in the AU10TIX case did not lead to exposure beyond what the researcher showed was possible. If age verification requirements are passed into law, users will likely find themselves forced to share their private information across networks of third-party companies if they want to continue accessing and sharing online content. Within a year, it wouldn’t be strange to have uploaded your ID to a half-dozen different platforms.

No matter how vigilant you are, you cannot control what other companies do with your data. If age verification requirements become law, you’ll have to be lucky every time you are forced to share your private information. Hackers will just have to be lucky once.

754

The downfall of Chevron deference could completely change the ways courts review net neutrality, according to Bloomberg Intelligence’s Matt Schettenhelm. “The FCC’s 2024 effort to reinstitute federal broadband regulation is the latest chapter in a long-running regulatory saga, yet we think the demise of deference will change its course in a fundamental way,” he wrote in a recent report. “This time, we don’t expect the FCC to prevail in court as it did in 2016.” Schettenhelm estimated an 80 percent chance of the FCC’s newest net neutrality order being blocked or overturned in the absence of Chevron deference.

Federal Trade Commission Chair Lina Khan has made no secret of her ambitions to use the agency’s authority to take bold action to restore competition to digital markets and protect consumers. But with Chevron being overturned amid a broader movement undermining agency authority without clear direction from Congress, Schettenhelm said, “it’s about the worst possible time for the FTC to be claiming novel rulemaking power to address unfair competition issues in a way that it never has before.”

Khan’s methods have drawn intense criticism from the business community, most recently with the agency’s labor-friendly rulemaking banning noncompete agreements in employment contracts. That action relies on the FTC’s interpretation of its authority to allow it to take action in this area — the kind of thing that brings up questions about agency deference.

317
[-] ForgottenFlux@lemmy.world 113 points 1 week ago

Tesla didn’t respond to a request for comment; it has dissolved its press office.

[-] ForgottenFlux@lemmy.world 132 points 2 weeks ago

Summary:

  • The US government is suing Adobe for allegedly deceiving customers with hidden fees and making it difficult to cancel subscriptions.
  • The Department of Justice claims Adobe enrolls customers in its most lucrative subscription plan without clearly disclosing important plan terms.
  • Adobe allegedly hides the terms of its annual, paid monthly plan in fine print and behind optional textboxes and hyperlinks.
  • The company fails to properly disclose the early termination fee, which can amount to hundreds of dollars, upon cancellation.
  • The cancellation process is described as "onerous and complicated", involving multiple webpages and pop-ups.
  • Customers who try to cancel over the phone or via live chats face similar obstacles, including dropped or disconnected calls and having to re-explain their reason for calling.
  • The lawsuit targets Adobe executives Maninder Sawhney and David Wadhwani, alleging they directed or participated in the deceptive practices.
  • The federal government began investigating Adobe's cancellation practices late last year.
  • Adobe's subscription model has long been a source of frustration for creatives, who feel forced to stay subscribed to continue working.
  • Recently, Adobe's new terms of service were met with backlash, with some users interpreting the changes as an opportunity for Adobe to train its AI on users' art.
  • The company has also faced regulatory scrutiny in the past, including antitrust scrutiny from European regulators over its attempted $20 billion acquisition of product design platform Figma in 2022, which was ultimately abandoned.
[-] ForgottenFlux@lemmy.world 185 points 1 month ago

Summary:

In the past, you could bypass the sign-in requirement by choosing ‘Offline Account’ or ‘Sign in with a local account instead.' However, Microsoft removed this option in recent years, meaning you would need an active internet connection to create a Microsoft account for a new Windows 11 install.

Some users discovered that they could bypass this requirement by using the following blocked email addresses: example@example.com, a@a.com, or no@thankyou.com, and then typing in a random password. While this would let you fall back to proceeding with an offline account until recently, it now results in an ‘Oops, something went wrong’ message, which will return you to the same email input screen.

Thankfully, there remains another way to install Windows 11 without a Microsoft account. When you’re at the log-in screen, you can hit Shift + F10 and type OOBE/BYPASSNRO, which will let you create a local account instead if you do not have an internet connection (so disconnect the internet for this). However, non-tech-savvy users will likely not know this, so many would likely end up creating another unwanted online account.

This is just one of the controversial steps Microsoft has recently been taking, like including ads in the Start Menu, nagging Windows 10 users to upgrade, or adding a watermark if your PC does not support AI features.

[-] ForgottenFlux@lemmy.world 104 points 1 month ago* (last edited 1 month ago)

For more than two and a half decades, we have collected, preserved, and shared our digital cultural artifacts. Thanks to the generosity of our patrons, the Internet Archive has grown from a small preservation project into a vast library that serves millions of people each year. Our work has impacted the lives of so many of our users who value free and open access to information.

From the beginning, it was important for the Internet Archive to be a nonprofit, because it was working for the people. Its motives had to be transparent; it had to last a long time. That's why we don't charge for access, sell user data, or run ads, even while we offer free resources to citizens everywhere. We rely on the generosity of individuals like you to pay for servers, staff, and preservation projects.

If you can't imagine a future without the Internet Archive, please consider supporting our work. We promise to put your donation to good use as we continue to store over 99 petabytes of data, including 625 billion webpages, 38 million books and texts, and 14 million audio recordings.

[-] ForgottenFlux@lemmy.world 373 points 1 month ago

Internet Archive is also being sued by the US book publishing and US recording industries associations, which are claiming copyright infringement and demanding combined damages of hundreds of millions of dollars and diminished services from all libraries.

“If our patrons around the globe think this latest situation is upsetting, then they should be very worried about what the publishing and recording industries have in mind,” added Kahle. “I think they are trying to destroy this library entirely and hobble all libraries everywhere. But just as we’re resisting the DDoS attack, we appreciate all the support in pushing back on this unjust litigation against our library and others.”

[-] ForgottenFlux@lemmy.world 137 points 1 month ago

Summary:

  • Internet Archive, including its Wayback Machine, has been facing sustained DDoS attacks for several days
  • The attacks began on Sunday and have been intermittent, but disruptive to the organization's services
  • Internet Archive says the attacks have been "sustained, impactful, targeted, adaptive, and mean"
  • Despite the attacks, the organization's collections are safe, though access has been inconsistent
  • This comes as Internet Archive is also embroiled in a legal battle with US book publishers over its Controlled Digital Lending program
  • The non-profit is working to harden its defenses to offer more reliable access to its digital library
  • Cyberattacks have been increasingly targeting libraries and other knowledge institutions recently
view more: next ›

ForgottenFlux

joined 5 months ago