Techrights logo

IRC: #techbytes @ Techrights IRC Network: Saturday, February 25, 2023

(ℹ) Join us now at the IRC channel | ䷉ Find the plain text version at this address (HTTP) or in Gemini (how to use Gemini) with a full GemText version.

*fulvene has quit (Ping timeout: 120 seconds)Feb 25 00:44
*libertybox_ is now known as schestowitz-polFeb 25 01:35
schestowitz[TR]  <li>Feb 25 10:15
schestowitz[TR]                                    <h5><a href="https://www.gamingonlinux.com/2023/02/ubuntu-flavours-to-drop-flatpak-by-default-and-stick-to-snaps/page=7/">Ubuntu flavours to drop Flatpak by default and stick to Snaps</a></h5>Feb 25 10:15
schestowitz[TR]                                    <blockquote>Feb 25 10:15
schestowitz[TR]                                        <p>Canonical has announced a change in the packaging defaults for the various "flavours" like Kubuntu, Ubuntu MATE, Ubuntu Budgie and so on to exclude Flatpak and stick with Snap. Yes that's flavours, not flavors but also flavors in the announcement.</p>Feb 25 10:15
schestowitz[TR]                                    </blockquote>Feb 25 10:15
schestowitz[TR]                                </li>Feb 25 10:15
-TechBytesBot/#techbytes-Ubuntu flavours to drop Flatpak by default and stick to Snaps | GamingOnLinuxFeb 25 10:15
schestowitz[TR]  <li>Feb 25 10:24
schestowitz[TR]                            <h5><a href="https://www.linuxinsider.com/story/not-all-linux-systems-are-created-equal-but-theyre-all-equally-linux-176894.html">Not All Linux Systems Are Created Equal, but They’re All Equally Linux</a></h5>Feb 25 10:24
schestowitz[TR]                            <blockquote>Feb 25 10:24
schestowitz[TR]                                <p>Linux is the most widely deployed desktop OS that readily grants users a full run of the system. True to its Unix heritage, everything is a file, and none are fenced off or hidden away. You can access UEFI firmware registers as files without difficulty. For instance, if you installed a Linux system on a device that shipped with Windows, you can dump the Windows license key with no problem.</p>Feb 25 10:24
schestowitz[TR]                                <p>Linux also lets you read and write to files representing input/output hardware devices. For example, the brightness of your laptop screen appears as a file with a single integer value, and you can instantly change the backlight’s intensity by altering the file’s value.</p>Feb 25 10:24
schestowitz[TR]                            </blockquote>Feb 25 10:24
schestowitz[TR]                        </li>Feb 25 10:24
-TechBytesBot/#techbytes-www.linuxinsider.com | Linux Systems Are Not Created Equal, but They're All Equally LinuxFeb 25 10:24
schestowitz[TR] <li>Feb 25 10:25
schestowitz[TR]                                    <h5><a href="https://www.omglinux.com/flathubs-rebrand-looks-ace/">Flathub’s Getting a New Logo – and it’s a Flawless Fit</a></h5>Feb 25 10:25
schestowitz[TR]                                    <blockquote>Feb 25 10:25
schestowitz[TR]                                        <p>Flathub’s new look is not live on the main site yet but the beta.flathub.org site is already sporting it. Design guidelines for the revamp, as well as SVG assets that can be used to promote it, can be acquired from Jakub’s blog post.</p>Feb 25 10:25
schestowitz[TR]                                    </blockquote>Feb 25 10:25
schestowitz[TR]                                </li>Feb 25 10:25
-TechBytesBot/#techbytes-www.omglinux.com | Flathub's Getting a New Logo – and it's a Flawless Fit - OMG! LinuxFeb 25 10:25
schestowitz[TR] <li>Feb 25 10:46
schestowitz[TR]                                    <h5><a href="https://boilingsteam.com/the-new-big-picture-mode-does-not-seem-to-work-well-with-nvidia-gpus-on-linux-clients/">The New Big Picture Mode Does not Seem to Work Well with Nvidia GPUs on Linux clients</a></h5>Feb 25 10:46
schestowitz[TR]                                    <blockquote>Feb 25 10:46
schestowitz[TR]                                        <p>The strange thing is that the previous BPM had no such problem on the very same hardware, so there’s definitely something amiss in regard to the interface with the (proprietary?) drivers for this new BPM.</p>Feb 25 10:46
schestowitz[TR]                                    </blockquote>Feb 25 10:46
schestowitz[TR]                                </li>Feb 25 10:46
-TechBytesBot/#techbytes-boilingsteam.com | The New Big Picture Mode Does not Seem to Work Well with Nvidia GPUs on Linux clients - Boiling SteamFeb 25 10:47
schestowitz[TR] <li>Feb 25 10:50
schestowitz[TR]                                            <h5><a href="https://www.schneier.com/blog/archives/2023/02/putting-undetectable-backdoors-in-machine-learning-models.html">Putting Undetectable Backdoors in Machine Learning Models</a></h5>Feb 25 10:50
schestowitz[TR]                                            <blockquote>Feb 25 10:50
schestowitz[TR]                                                <p>Abstract: Given the computational cost and technical expertise required to train machine learning models, users may delegate the task of learning to a service provider. Delegation of learning has clear benefits, and at the same time raises serious concerns of trust. This work studies possible abuses of power by untrusted learners.We show how a malicious learner can plant an undetectFeb 25 10:50
schestowitz[TR]able backdoor into a classifier. On the surface, such a backdoored classifier behaves normally, but in reality, the learner maintains a mechanism for changing the classification of any input, with only a slight perturbation. Importantly, without the appropriate “backdoor key,” the mechanism is hidden and cannot be detected by any computationally-bounded observer. We demonstrate two frameworks for planting undetectable backdoors,Feb 25 10:50
schestowitz[TR] with incomparable guarantees.</p>Feb 25 10:50
schestowitz[TR]                                            </blockquote>Feb 25 10:50
schestowitz[TR]                                        </li>Feb 25 10:50
-TechBytesBot/#techbytes-Putting Undetectable Backdoors in Machine Learning Models - Schneier on SecurityFeb 25 10:50
schestowitz[TR]<li>Feb 25 10:50
schestowitz[TR]                                            <h5><a href="https://www.nytimes.com/2023/02/23/technology/personaltech/twitter-two-factor-authentication.html">Why You Should Listen to Twitter on Two-Factor Authentication</a></h5>Feb 25 10:50
schestowitz[TR]                                            <blockquote>Feb 25 10:50
schestowitz[TR]                                                <p>In plain speak, two-factor authentication requires two security steps to verify that you are who you say you are. The first step asks for a user name and password, and the second requires you to either enter a temporary code that is sent to you or connect to a physical security key. This way, even if someone has your password, that person will need to fulfill the second step to log Feb 25 10:50
schestowitz[TR]in to your account.</p>Feb 25 10:50
schestowitz[TR]                                            </blockquote>Feb 25 10:50
schestowitz[TR]                                        </li>Feb 25 10:50
-TechBytesBot/#techbytes-www.nytimes.com | Why You Should Listen to Twitter on Two-Factor Authentication - The New York TimesFeb 25 10:50
schestowitz[TR]    <li>Feb 25 11:00
schestowitz[TR]                                    <h5><a href="https://www.securityweek.com/11-countries-take-part-in-military-cyberwarfare-exercise/">11 Countries Take Part in Military Cyberwarfare Exercise</a></h5>Feb 25 11:00
schestowitz[TR]                                    <blockquote>Feb 25 11:00
schestowitz[TR]                                        <p>The seven-day event, led by the British Army, tested the response of participants to common and complex cyber scenarios, including attacks on networks and industrial control systems (ICS).</p>Feb 25 11:00
schestowitz[TR]                                    </blockquote>Feb 25 11:00
schestowitz[TR]                                </li>Feb 25 11:00
-TechBytesBot/#techbytes-11 Countries Take Part in Military Cyberwarfare Exercise - SecurityWeekFeb 25 11:00
schestowitz[TR] <li>Feb 25 11:00
schestowitz[TR]                                    <h5><a href="https://cyberscoop.com/ukraine-russia-cyberwar-anniversary/">A year after Russia’s invasion, the scope of cyberwar in Ukraine comes into focus</a></h5>Feb 25 11:00
schestowitz[TR]                                    <blockquote>Feb 25 11:00
schestowitz[TR]                                        <p>A year after Russia’s invasion, it is possible to begin accounting for the role digital weapons have played in the conflict. Sophisticated Russian cyberattacks — such as those targeting the electricity grid — have either failed to materialize, been thwarted or gone unobserved. Cyberwarfare in Ukraine has instead been marked by widespread deployment of wipers — designed to delete andFeb 25 11:00
schestowitz[TR] destroy data — and extensive information operations.</p>Feb 25 11:00
schestowitz[TR]                                    </blockquote>Feb 25 11:00
schestowitz[TR]                                </li>Feb 25 11:00
schestowitz[TR]                                Feb 25 11:00
-TechBytesBot/#techbytes-A year after Russia's invasion, the scope of cyberwar in Ukraine comes into focus | CyberScoopFeb 25 11:00
schestowitz[TR]  <li>Feb 25 11:24
schestowitz[TR]                            <h5><a href="https://www.michaelgeist.ca/2023/02/billc18reality/">The Bill C-18 Reality: Everyone Loses When the Government Mandates Payments for Links</a></h5>Feb 25 11:24
schestowitz[TR]                            <blockquote>Feb 25 11:24
schestowitz[TR]                                <p>The report that Google is conducting a national test that removes links to Canadian news sites for a small percentage of users sparked a predictable reaction as politicians who were warned that Bill C-18 could lead to this, now want to know how it could happen. None of this week’s developments should come as a surprise. Bill C-18 presents Google and Facebook with a choice: pay hundreds of millionFeb 25 11:24
schestowitz[TR]s of dollars primarily to Canadian broadcasters for links to news articles or stop linking. Both companies are doing precisely what they said they would do, namely considering stopping linking (Google conducted the same tests in Australia several years ago). Indeed, strip away the hyperbole and the bottom line is this: the costs of Bill C-18 are enormous (the government’s Senate representative suggesting the bill could result in rFeb 25 11:24
schestowitz[TR]evenues to cover 35% of news expenditures of every news outlet in Canada) and the revenues from news for the platforms are not (Facebook says news only constitutes 3 percent of posts and Google does not even run ads on its Google News product). As some have noted, the government says the companies are stealing content if they link and blocking content if they don’t.</p>Feb 25 11:24
schestowitz[TR]                            </blockquote>Feb 25 11:24
schestowitz[TR]                        </li>Feb 25 11:24
schestowitz[TR]                        Feb 25 11:24
-TechBytesBot/#techbytes-www.michaelgeist.ca | The Bill C-18 Reality: Everyone Loses When the Government Mandates Payments for Links - Michael GeistFeb 25 11:24
schestowitz[TR]  <li>Feb 25 11:29
schestowitz[TR]                            <h5><a href="https://stanforddaily.com/2023/02/23/letter-from-the-editors-arts-journalism-needs-independence/">Letter from the editors: Arts journalism needs independence</a></h5>Feb 25 11:29
schestowitz[TR]                            <blockquote>Feb 25 11:29
schestowitz[TR]                                <p>The commonality between all of these sections is the strong commitment to reporting and reviewing art at Stanford and beyond. Though the nature of our coverage has changed over time — as you can see with Greta Reich’s ’26 history of art reviews — the principles that guide our section remain steadfast. In particular, we strive to support artists, provide meaningful reviews to those who need Feb 25 11:29
schestowitz[TR]them and report truthfully on events and stories in the arts. This letter argues that The Daily’s independence from Stanford is critical to the Arts & Life section’s integrity.</p>Feb 25 11:29
schestowitz[TR]                            </blockquote>Feb 25 11:29
schestowitz[TR]                        </li>Feb 25 11:29
-TechBytesBot/#techbytes-stanforddaily.com | Letter from the editors: Arts journalism needs independenceFeb 25 11:29
schestowitz[TR]                      <li>Feb 25 11:35
schestowitz[TR]                                    <h5><a href="https://www.digitalmusicnews.com/2023/02/23/us-copyright-office-refuses-to-issue-protections-for-ai-generated-illustrations/">US Copyright Office Refuses to Issue Protections for AI-Generated Illustrations</a></h5>Feb 25 11:35
schestowitz[TR]                                    <blockquote>Feb 25 11:35
schestowitz[TR]                                        <p>The US Copyright Office says it should not have granted copyright protection to images in a graphic novel that were created using the AI system Midjourney. “Zarya of the Dawn” author Kris Kashtanova is entitled to copyright protection for the parts of the book they wrote and arranged but not for the images generated by Midjourney, the office said in its letter on Tuesday.</p>Feb 25 11:35
schestowitz[TR]                                        <p>This decision is one of the first by a US court or agency on the issue of copyright protection for works created with AI amid the astronomic rise in generative AI software like Midjourney and ChatGPT.</p>Feb 25 11:35
schestowitz[TR]                                    </blockquote>Feb 25 11:35
schestowitz[TR]                                </li>Feb 25 11:35
schestowitz[TR]                                Feb 25 11:35
-TechBytesBot/#techbytes- ( status 520 @ https://www.digitalmusicnews.com/2023/02/23/us-copyright-office-refuses-to-issue-protections-for-ai-generated-illustrations/ )Feb 25 11:35
*psydroid2 (~psydroid@cbcfptirpkfqa.irc) has joined #techbytesFeb 25 12:25
*psydroid2 has quit (Ping timeout: 2m30s)Feb 25 12:43
*psydroid2 (~psydroid@cbcfptirpkfqa.irc) has joined #techbytesFeb 25 12:45
*psydroid2 has quit (Ping timeout: 2m30s)Feb 25 16:30
*psydroid3 (~psydroid@cbcfptirpkfqa.irc) has joined #techbytesFeb 25 16:30
*psydroid2 (~psydroid@cbcfptirpkfqa.irc) has joined #techbytesFeb 25 16:54
*psydroid3 has quit (Ping timeout: 2m30s)Feb 25 16:54
*psydruid has quit (Ping timeout: 2m30s)Feb 25 16:56
*psydruid (~psydruid@jevhxkzmtrbww.irc) has joined #techbytesFeb 25 16:57
*psydroid2 has quit (connection closed)Feb 25 23:00

Generated by irclog2html.py 2.6 | ䷉ find the plain text version at this address (HTTP) or in Gemini (how to use Gemini) with a full GemText version.