●● IRC: #techbytes @ Techrights IRC Network: Saturday, February 25, 2023 ●● ● Feb 25 [00:44] *fulvene has quit (Ping timeout: 120 seconds) ● Feb 25 [01:35] *libertybox_ is now known as schestowitz-pol ● Feb 25 [10:15] schestowitz[TR]
  • [10:15] schestowitz[TR]
    Ubuntu flavours to drop Flatpak by default and stick to Snaps
    [10:15] schestowitz[TR]
    [10:15] schestowitz[TR]

    Canonical has announced a change in the packaging defaults for the various "flavours" like Kubuntu, Ubuntu MATE, Ubuntu Budgie and so on to exclude Flatpak and stick with Snap. Yes that's flavours, not flavors but also flavors in the announcement.

    [10:15] schestowitz[TR]
    [10:15] schestowitz[TR]
  • [10:15] -TechBytesBot/#techbytes-Ubuntu flavours to drop Flatpak by default and stick to Snaps | GamingOnLinux [10:24] schestowitz[TR]
  • [10:24] schestowitz[TR]
    Not All Linux Systems Are Created Equal, but Theyre All Equally Linux
    [10:24] schestowitz[TR]
    [10:24] schestowitz[TR]

    Linux is the most widely deployed desktop OS that readily grants users a full run of the system. True to its Unix heritage, everything is a file, and none are fenced off or hidden away. You can access UEFI firmware registers as files without difficulty. For instance, if you installed a Linux system on a device that shipped with Windows, you can dump the Windows license key with no problem.

    [10:24] schestowitz[TR]

    Linux also lets you read and write to files representing input/output hardware devices. For example, the brightness of your laptop screen appears as a file with a single integer value, and you can instantly change the backlights intensity by altering the files value.

    [10:24] schestowitz[TR]
    [10:24] schestowitz[TR]
  • [10:24] -TechBytesBot/#techbytes-www.linuxinsider.com | Linux Systems Are Not Created Equal, but They're All Equally Linux [10:25] schestowitz[TR]
  • [10:25] schestowitz[TR]
    Flathubs Getting a New Logo and its a Flawless Fit
    [10:25] schestowitz[TR]
    [10:25] schestowitz[TR]

    Flathubs new look is not live on the main site yet but the beta.flathub.org site is already sporting it. Design guidelines for the revamp, as well as SVG assets that can be used to promote it, can be acquired from Jakubs blog post.

    [10:25] schestowitz[TR]
    [10:25] schestowitz[TR]
  • [10:25] -TechBytesBot/#techbytes-www.omglinux.com | Flathub's Getting a New Logo and it's a Flawless Fit - OMG! Linux [10:46] schestowitz[TR]
  • [10:46] schestowitz[TR]
    The New Big Picture Mode Does not Seem to Work Well with Nvidia GPUs on Linux clients
    [10:46] schestowitz[TR]
    [10:46] schestowitz[TR]

    The strange thing is that the previous BPM had no such problem on the very same hardware, so theres definitely something amiss in regard to the interface with the (proprietary?) drivers for this new BPM.

    [10:46] schestowitz[TR]
    [10:46] schestowitz[TR]
  • [10:47] -TechBytesBot/#techbytes-boilingsteam.com | The New Big Picture Mode Does not Seem to Work Well with Nvidia GPUs on Linux clients - Boiling Steam [10:50] schestowitz[TR]
  • [10:50] schestowitz[TR]
    Putting Undetectable Backdoors in Machine Learning Models
    [10:50] schestowitz[TR]
    [10:50] schestowitz[TR]

    Abstract: Given the computational cost and technical expertise required to train machine learning models, users may delegate the task of learning to a service provider. Delegation of learning has clear benefits, and at the same time raises serious concerns of trust. This work studies possible abuses of power by untrusted learners.We show how a malicious learner can plant an undetect [10:50] schestowitz[TR] able backdoor into a classifier. On the surface, such a backdoored classifier behaves normally, but in reality, the learner maintains a mechanism for changing the classification of any input, with only a slight perturbation. Importantly, without the appropriate backdoor key, the mechanism is hidden and cannot be detected by any computationally-bounded observer. We demonstrate two frameworks for planting undetectable backdoors, [10:50] schestowitz[TR] with incomparable guarantees.

    [10:50] schestowitz[TR]
    [10:50] schestowitz[TR]
  • [10:50] -TechBytesBot/#techbytes-Putting Undetectable Backdoors in Machine Learning Models - Schneier on Security [10:50] schestowitz[TR]
  • [10:50] schestowitz[TR]
    Why You Should Listen to Twitter on Two-Factor Authentication
    [10:50] schestowitz[TR]
    [10:50] schestowitz[TR]

    In plain speak, two-factor authentication requires two security steps to verify that you are who you say you are. The first step asks for a user name and password, and the second requires you to either enter a temporary code that is sent to you or connect to a physical security key. This way, even if someone has your password, that person will need to fulfill the second step to log [10:50] schestowitz[TR] in to your account.

    [10:50] schestowitz[TR]
    [10:50] schestowitz[TR]
  • [10:50] -TechBytesBot/#techbytes-www.nytimes.com | Why You Should Listen to Twitter on Two-Factor Authentication - The New York Times ● Feb 25 [11:00] schestowitz[TR]
  • [11:00] schestowitz[TR]
    11 Countries Take Part in Military Cyberwarfare Exercise
    [11:00] schestowitz[TR]
    [11:00] schestowitz[TR]

    The seven-day event, led by the British Army, tested the response of participants to common and complex cyber scenarios, including attacks on networks and industrial control systems (ICS).

    [11:00] schestowitz[TR]
    [11:00] schestowitz[TR]
  • [11:00] -TechBytesBot/#techbytes-11 Countries Take Part in Military Cyberwarfare Exercise - SecurityWeek [11:00] schestowitz[TR]
  • [11:00] schestowitz[TR]
    A year after Russias invasion, the scope of cyberwar in Ukraine comes into focus
    [11:00] schestowitz[TR]
    [11:00] schestowitz[TR]

    A year after Russias invasion, it is possible to begin accounting for the role digital weapons have played in the conflict. Sophisticated Russian cyberattacks such as those targeting the electricity grid have either failed to materialize, been thwarted or gone unobserved. Cyberwarfare in Ukraine has instead been marked by widespread deployment of wipers designed to delete and [11:00] schestowitz[TR] destroy data and extensive information operations.

    [11:00] schestowitz[TR]
    [11:00] schestowitz[TR]
  • [11:00] schestowitz[TR] [11:00] -TechBytesBot/#techbytes-A year after Russia's invasion, the scope of cyberwar in Ukraine comes into focus | CyberScoop [11:24] schestowitz[TR]
  • [11:24] schestowitz[TR]
    The Bill C-18 Reality: Everyone Loses When the Government Mandates Payments for Links
    [11:24] schestowitz[TR]
    [11:24] schestowitz[TR]

    The report that Google is conducting a national test that removes links to Canadian news sites for a small percentage of users sparked a predictable reaction as politicians who were warned that Bill C-18 could lead to this, now want to know how it could happen. None of this weeks developments should come as a surprise. Bill C-18 presents Google and Facebook with a choice: pay hundreds of million [11:24] schestowitz[TR] s of dollars primarily to Canadian broadcasters for links to news articles or stop linking. Both companies are doing precisely what they said they would do, namely considering stopping linking (Google conducted the same tests in Australia several years ago). Indeed, strip away the hyperbole and the bottom line is this: the costs of Bill C-18 are enormous (the governments Senate representative suggesting the bill could result in r [11:24] schestowitz[TR] evenues to cover 35% of news expenditures of every news outlet in Canada) and the revenues from news for the platforms are not (Facebook says news only constitutes 3 percent of posts and Google does not even run ads on its Google News product). As some have noted, the government says the companies are stealing content if they link and blocking content if they dont.

    [11:24] schestowitz[TR]
    [11:24] schestowitz[TR]
  • [11:24] schestowitz[TR] [11:24] -TechBytesBot/#techbytes-www.michaelgeist.ca | The Bill C-18 Reality: Everyone Loses When the Government Mandates Payments for Links - Michael Geist [11:29] schestowitz[TR]
  • [11:29] schestowitz[TR]
    Letter from the editors: Arts journalism needs independence
    [11:29] schestowitz[TR]
    [11:29] schestowitz[TR]

    The commonality between all of these sections is the strong commitment to reporting and reviewing art at Stanford and beyond. Though the nature of our coverage has changed over time as you can see with Greta Reichs 26 history of art reviews the principles that guide our section remain steadfast. In particular, we strive to support artists, provide meaningful reviews to those who need [11:29] schestowitz[TR] them and report truthfully on events and stories in the arts. This letter argues that The Dailys independence from Stanford is critical to the Arts & Life sections integrity.

    [11:29] schestowitz[TR]
    [11:29] schestowitz[TR]
  • [11:29] -TechBytesBot/#techbytes-stanforddaily.com | Letter from the editors: Arts journalism needs independence [11:35] schestowitz[TR]
  • [11:35] schestowitz[TR]
    US Copyright Office Refuses to Issue Protections for AI-Generated Illustrations
    [11:35] schestowitz[TR]
    [11:35] schestowitz[TR]

    The US Copyright Office says it should not have granted copyright protection to images in a graphic novel that were created using the AI system Midjourney. Zarya of the Dawn author Kris Kashtanova is entitled to copyright protection for the parts of the book they wrote and arranged but not for the images generated by Midjourney, the office said in its letter on Tuesday.

    [11:35] schestowitz[TR]

    This decision is one of the first by a US court or agency on the issue of copyright protection for works created with AI amid the astronomic rise in generative AI software like Midjourney and ChatGPT.

    [11:35] schestowitz[TR]
    [11:35] schestowitz[TR]
  • [11:35] schestowitz[TR] [11:35] -TechBytesBot/#techbytes- ( status 520 @ https://www.digitalmusicnews.com/2023/02/23/us-copyright-office-refuses-to-issue-protections-for-ai-generated-illustrations/ ) ● Feb 25 [12:25] *psydroid2 (~psydroid@cbcfptirpkfqa.irc) has joined #techbytes [12:43] *psydroid2 has quit (Ping timeout: 2m30s) [12:45] *psydroid2 (~psydroid@cbcfptirpkfqa.irc) has joined #techbytes ● Feb 25 [16:30] *psydroid2 has quit (Ping timeout: 2m30s) [16:30] *psydroid3 (~psydroid@cbcfptirpkfqa.irc) has joined #techbytes [16:54] *psydroid2 (~psydroid@cbcfptirpkfqa.irc) has joined #techbytes [16:54] *psydroid3 has quit (Ping timeout: 2m30s) [16:56] *psydruid has quit (Ping timeout: 2m30s) [16:57] *psydruid (~psydruid@jevhxkzmtrbww.irc) has joined #techbytes ● Feb 25 [23:00] *psydroid2 has quit (connection closed)