Technology

37801 readers
208 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
1
 
 

Hey Beeple and visitors to Beehaw: I think we need to have a discussion about !technology@beehaw.org, community culture, and moderation. First, some of the reasons that I think we need to have this conversation.

  1. Technology got big fast and has stayed Beehaw's most active community.
  2. Technology gets more reports (about double in the last month by a rough hand count) than the next highest community that I moderate (Politics, and this is during election season in a month that involved a disastrous debate, an assassination attempt on a candidate, and a major party's presumptive nominee dropping out of the race)
  3. For a long time, I and other mods have felt that Technology at times isn’t living up to the Beehaw ethos. More often than I like I see comments in this community where users are being abusive or insulting toward one another, often without any provocation other than the perception that the other user’s opinion is wrong.

Because of these reasons, we have decided that we may need to be a little more hands-on with our moderation of Technology. Here’s what that might mean:

  1. Mods will be more actively removing comments that are unkind or abusive, that involve personal attacks, or that just have really bad vibes.
    a. We will always try to be fair, but you may not always agree with our moderation decisions. Please try to respect those decisions anyway. We will generally try to moderate in a way that is a) proportional, and b) gradual.
    b. We are more likely to respond to particularly bad behavior from off-instance users with pre-emptive bans. This is not because off-instance users are worse, or less valuable, but simply that we aren't able to vet users from other instances and don't interact with them with the same frequency, and other instances may have less strict sign-up policies than Beehaw, making it more difficult to play whack-a-mole.
  2. We will need you to report early and often. The drawbacks of getting reports for something that doesn't require our intervention are outweighed by the benefits of us being able to get to a situation before it spirals out of control. By all means, if you’re not sure if something has risen to the level of violating our rule, say so in the report reason, but I'd personally rather get reports early than late, when a thread has spiraled into an all out flamewar.
    a. That said, please don't report people for being wrong, unless they are doing so in a way that is actually dangerous to others. It would be better for you to kindly disagree with them in a nice comment.
    b. Please, feel free to try and de-escalate arguments and remind one another of the humanity of the people behind the usernames. Remember to Be(e) Nice even when disagreeing with one another. Yes, even Windows users.
  3. We will try to be more proactive in stepping in when arguments are happening and trying to remind folks to Be(e) Nice.
    a. This isn't always possible. Mods are all volunteers with jobs and lives, and things often get out of hand before we are aware of the problem due to the size of the community and mod team.
    b. This isn't always helpful, but we try to make these kinds of gentle reminders our first resort when we get to things early enough. It’s also usually useful in gauging whether someone is a good fit for Beehaw. If someone responds with abuse to a gentle nudge about their behavior, it’s generally a good indication that they either aren’t aware of or don’t care about the type of community we are trying to maintain.

I know our philosophy posts can be long and sometimes a little meandering (personally that's why I love them) but do take the time to read them if you haven't. If you can't/won't or just need a reminder, though, I'll try to distill the parts that I think are most salient to this particular post:

  1. Be(e) nice. By nice, we don't mean merely being polite, or in the surface-level "oh bless your heart" kind of way; we mean be kind.
  2. Remember the human. The users that you interact with on Beehaw (and most likely other parts of the internet) are people, and people should be treated kindly and in good-faith whenever possible.
  3. Assume good faith. Whenever possible, and until demonstrated otherwise, assume that users don't have a secret, evil agenda. If you think they might be saying or implying something you think is bad, ask them to clarify (kindly) and give them a chance to explain. Most likely, they've communicated themselves poorly, or you've misunderstood. After all of that, it's possible that you may disagree with them still, but we can disagree about Technology and still give one another the respect due to other humans.
2
 
 
3
 
 

Archived version

The Russian disinformation network “Matryoshka” has launched a new campaign on the Bluesky social network. Eliot Higgins, founder of the investigative journalism group Bellingcat, has been one of the first researchers to detect its activity. So far, four Russian-made fake videos have been identified on the platform.

Each disinformation video begins with a real person — a professor, a student from a top university, or a recognized expert — introducing themselves and beginning to speak on a topic unrelated to Russia’s war in Ukraine. The footage then transitions to segments that do not show the speaker on screen — while what sounds like their voice continues narrating. In these moments, the speaker seems to promote claims that the West should end its support for Ukraine, that Europe should align its future with Russia, and that Volodymyr Zelensky is a dictator — or even a vampire.

[...]

The videos circulating on Bluesky had previously appeared on X, according to the Bot Blocker project (@antibot4navalny), which first uncovered and detailed the workings of the Matryoshka network in early 2024.

[...]

4
 
 

I just set up my Loops account in order to beta test the iOS app.

Uploaded my first video here: https://loops.video/v/5s_wUUCHsZ

So far so good.

5
 
 

spoilerIt seems the Honey Coupon extension wasn't just making money by tracking purchases from users, but also by taking credit for the sales for PayPal (since they are owned by it) by changing your local cookies. Pretty shady if you ask me.

6
 
 

Archived link

Opinionated article by Alexander Hanff, a computer scientist and privacy technologist who helped develop Europe's GDPR (General Data Protection Regulation) and ePrivacy rules.

We cannot allow Big Tech to continue to ignore our fundamental human rights. Had such an approach been taken 25 years ago in relation to privacy and data protection, arguably we would not have the situation we have to today, where some platforms routinely ignore their legal obligations at the detriment of society.

Legislators did not understand the impact of weak laws or weak enforcement 25 years ago, but we have enough hindsight now to ensure we don’t make the same mistakes moving forward. The time to regulate unlawful AI training is now, and we must learn from mistakes past to ensure that we provide effective deterrents and consequences to such ubiquitous law breaking in the future.

7
8
 
 

Albania's prime minister has announced the government intends to block access to TikTok for one year after the killing of a schoolboy last month raised fears about the influence of social media on children.

Speaking on Saturday Edi Rama declared the proposed ban would start in January.

[...]

The blocking of TikTok comes less than a month after the 14-year-old student was killed and another injured in a fight near a school in southern Tirana which had its roots in a confrontation on social media.

The killing sparked a debate in Albania among parents, psychologists and educational institutions about the impact of social networks on young people.

"In China, TikTok promotes how students can take courses, how to protect nature, how to keep traditions, but on the TikTok outside China we see only scum and mud. Why do we need this?", Rama said.

TikTok is already banned in India, which was one of the app's largest markets before it was outlawed in June 2020. It is also blocked in Iran, Nepal, Afghanistan and Somalia.

TikTok is also fighting against a law passed by the US Congress which would ban the app from 19 January unless it is sold by ByteDance - its Chinese parent

company.

9
10
 
 

Archived version

Download study (pdf)

GitHub, the de-facto platform for open-source software development, provides a set of social-media-like features to signal high-quality repositories. Among them, the star count is the most widely used popularity signal, but it is also at risk of being artificially inflated (i.e., faked), decreasing its value as a decision-making signal and posing a security risk to all GitHub users.

A recent paper by Cornell University published on Arxiv, the researchers present a systematic, global, and longitudinal measurement study of fake stars in GitHub: StarScout, a scalable tool able to detect anomalous starring behaviors (i.e., low activity and lockstep) across the entire GitHub metadata.

Analyzing the data collected using StarScout, they find that:

(1) fake-star-related activities have rapidly surged since 2024

(2) the user profile characteristics of fake stargazers are not distinct from average GitHub users, but many of them have highly abnormal activity patterns

(3) the majority of fake stars are used to promote short-lived malware repositories masquerading as pirating software, game cheats, or cryptocurrency bots

(4) some repositories may have acquired fake stars for growth hacking, but fake stars only have a promotion effect in the short term (i.e., less than two months) and become a burden in the long term.

The study has implications for platform moderators, open-source practitioners, and supply chain security researchers.

11
 
 

Archived

Here is the report (pdf) -- (archived)

Oasis Security's research team uncovered a critical vulnerability in Microsoft's Multi-Factor Authentication (MFA) implementation, allowing attackers to bypass it and gain unauthorized access to the user’s account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more. Microsoft has more than 400 million paid Office 365 seats, making the consequences of this vulnerability far-reaching.

The bypass was simple: it took around an hour to execute, required no user interaction and did not generate any notification or provide the account holder with any indication of trouble.

[Edit to insert the original link to the Oasis site.]

12
13
14
15
 
 

Brian Merchant and Paris Marx are back with the very first guest of System Crash: Molly White! With Molly’s help, we walk through the biggest stories in the crypto world. We explore the resurgence of crypto, how its backers influenced the election and won Trump’s favor, what the crypto industry wants from the incoming administration—and how it plans to wield power.

16
 
 

The gig economy’s labor model and its algorithmic management technologies now have a foothold in one of the largest labor sectors in the country: health care. On-demand nursing companies such as CareRev, Clipboard Health, ShiftKey, and ShiftMed have promised hospitals more control and nurses more flexibility. Through original interviews with 29 “gig” nurses and nursing assistants, this brief finds that these apps encourage nurses to work for less pay, fail to provide certainty about scheduling and the amount or nature of work, take little to no accountability for worker safety, and can threaten patient well-being by placing nurses in unfamiliar clinical environments with no onboarding or facility training. On-demand nursing platforms are also using the Uber playbook to lobby state legislatures in an attempt to exempt themselves from existing labor regulations. In the wake of the COVID-19 pandemic, nurses have fled the profession as a result of poor working conditions, creating what some have incorrectly identified as a “nursing shortage.” As gig nursing platforms falsely promise to empower workers and meet their needs, it is up to legislators, policymakers, civic leaders, and community organizations to act to solve the real problems at the root of this crisis.

17
18
19
20
21
 
 

Original article paywalled

Authorities in the US are considering a ban on TP-Link internet routers over national security concerns due to their repeated links to Chinese cyberattacks. Investigators at the Commerce, Defense, and Justice departments have all launched probes into the company [...] with TP-Link reportedly being subpoenaed by an office of the Commerce Department.

[...]

TP-Link holds roughly 65 percent of the US router market for homes and small businesses, and its internet communications products are used by the Defense Department and other federal government agencies. The company’s market dominance is at least partly driven by the extreme low cost of its routers. The US Justice Department is investigating whether TP-Link sells products for less than they cost to produce in violation of a law that prohibits attempts at monopolies.

[...]

22
 
 

Study download: Progress in Diversifying the Global Solar PV Supply Chain (pdf)

TLDR:

Until the end of this decade, China and Chinese manufacturers will retain some domination over the global solar PV chain. However, the global solar PV supply chain is becoming more robust thanks to the diversification of crystalline silicon modules manufacturing capacity in the United States, Europe, Southeast Asia, and India, according to a report by Japan's Renewable Energy Institute.

In the 2030s, improvements in solar PV recycling and the widespread adoption of new technologies like perovskite cells, which development is led by China (glass substrate) and Japan (film substrate), will provide new opportunities to further diversify the global solar PV supply chain.

This progress will strengthen worldwide energy security and facilitate the much-needed acceleration of the energy transition.

Geographic concentration of the global solar supply chain exposes the supply chain to some drawbacks, the report finds. The potential disruption risks associated with this type of concentration include natural hazards such as earthquakes and fires, and extreme weather events such as drought and flooding. "For instance, in 2020 and 2022, the global production of polysilicon was reduced because of flooding and fire issues at a handful of Chinese plants," the study says.

The report also mentions both the situation in China's Xinjiang region and Uyghur forced labour as well as China's coal intensity as concerns with China's dominance of global solar supply chain as main drivers of diversification. While citing "human rights violations, unfair trade practices, and environmental pollution," the study criticizes that "the lack of transparency [across supply chains within China] has made it increasingly difficult to verify whether supply chains are free from risk of Uyghur forced labor and reduces trust in the solar industry."

Key Findings:

• As of September 2024, 99% of the world’s solar PV modules manufacturing capacity was based on crystalline silicon because this technology is inexpensive, performant, and durable. Approximately three-fourths of the economic value of crystalline silicon modules come from four minerals: silicon, silver, aluminum, and copper, which productions are generally not excessively geographically concentrated.

• Throughout the entire solar PV supply chain (i.e., polysilicon, ingots, wafers, cells, and modules), the shares of China and Chinese manufacturers often largely exceeded 80% and they were sometimes close to 100%. It is undesirable for any supply chain to be so dependent on a single country. This is the reason why diversification efforts are led across the world (e.g., United States, Europe, Japan, Southeast Asia and India).

• The Chinese industry dominates the solar PV supply chain because it has managed to maximize economies of scale and because it is well-organized around vertically integrated companies. Moreover, the Chinese solar PV industry is innovative and effectively supported by its government. Also, it benefits from affordable electricity prices, which is critical as solar PV manufacturing is electricity intensive.

• The Chinese solar PV industry is confronted with harsh criticisms due to human rights violations, unfair trade practices, and environmental pollution due to its reliance on coal power. Furthermore, China’s aggressive export strategy is blamed for solar PV products oversupply resulting in rock-bottom prices and economic losses.

• In the United States, a combination of subsidies (i.e., tax credits) and protectionist measures have been implemented. Many new projects have been announced, they now need to be realized.

• Europe tries to balance its own interests between increasing its manufacturing capacity and taking advantage of cheap Chinese imports. So far, priority has been given to demand over domestic supply as reducing electricity prices and greenhouse gas emissions are deemed more urgent issues.

• Japan puts the emphasis on perovskite cells, a promising technology that is not fully ready for commercial deployment yet. This strategy should, however, not be used as an excuse for not more proactively installing crystalline silicon. Affordable and rapid decarbonization does not need to wait for perovskite to become mainstream.

• Despite catching less attention, Southeast Asia and India significantly contribute to the diversification of the solar PV supply chain. In Southeast Asia, labor costs are low, and energy is subsidized. In India domestic-content requirements and customs duties have been implemented.

• In addition to these efforts, solar PV recycling and new technologies, like perovskite, hold the potential to be alternatives to Chinese crystalline silicon modules in the 2030s. To take off, these solutions need more governmental support.

23
24
 
 

Seen on Bluesky minutes ago.

From the mission page:

We're betting on services built on open protocols like ActivityPub and ATProto, and focused on making it easier to connect and move between platforms. We will work directly with developers to continue ensuring competition in the open social web, with a focus on advocating for users every step of the way.

25
view more: next ›