It’s the effect of a persistent decades-long disinformation campaign perpetrated by those who wish to destabilize western democracies which has been signal-boosted by naive (or maliciously designed) recommendation algorithms on social media platforms.
- 26 Posts
- 1.14K Comments
drspod@lemmy.mlto PC Gaming@lemmy.ca•You are NOT ready for this! – Endlight (Review)English4·19 hours agoNow this is web-design I can get behind.
This game sounds like it has some really interesting ideas. The comparisons with Rez and the description of the game made me think of Thumper, which is also a game you should definitely try.
Christine Lemmer-Webber made an excellent blog post ~6 months ago titled How Decentralized is Bluesky really?
Give that a read.
drspod@lemmy.mlto Privacy@lemmy.ml•Thunderbird email client makes connections to sites that have nothing to do with sending and receiving email, for "telemetry" and other questionable reasons8·2 days ago“I want you to rebuild everything around my nerds”.
Where my nerds at!?
LLM’s produce fan-fiction of reality.
In this case, it’s just preaching to the choir. The purpose of an allegory is usually to present a convincing argument to people who are as yet unconvinced, by presenting the argument from a different point of view that they haven’t considered.
drspod@lemmy.mlto Fuck AI@lemmy.world•Let's Talk About ChatGPT-Induced Spiritual Psychosis7·3 days agoIs it just the “Substack hosts fascist blogs so everyone using Substack is fascist by association” thing?
Is that not enough for you?
drspod@lemmy.mlto Fuck AI@lemmy.world•They're Putting Blue Food Coloring in Everything1115·3 days agoI don’t think this is really a very good allegory. The author has written 835 words and only managed to express that:
- blue food tastes kind of weird
- they’re putting it in everything
- they’re putting up the prices of blue food
- you can’t get normal food even if you want it
It’s not surprising to me that some people didn’t get that it was about AI.
The allegory would work better if:
- production of blue food colouring took so much energy that they were bringing coal power plants back online and exacerbating climate change
- in order to design the blue food colouring, they had to steal every person’s recipe books without permission and regardless of how private that information might be to the owner
- the blue food colouring could spontaneously make a food taste almost like someone’s personal family recipe without their permission
- foods containing the blue food colouring completely lack any expected nutritional content, and when a blue food does contain nutrition it’s just a random accident of the process
- scientific studies of people eating exclusively blue foods show that not only are they malnourished, but their body can no longer process normal foods as efficiently as before.
To make these points, I think the metaphor needs to be something a little bit more complex than “blue food colouring.” Perhaps food made by a food replicator would make for a better example.
drspod@lemmy.mlto United Kingdom@feddit.uk•All babies in England to get DNA test to assess risk of diseases within 10 yearsEnglish7·3 days agoAlready widely used in the western world
Really?
drspod@lemmy.mlto camping@sh.itjust.works•Glamping in Wales. It was pretty cold out, so we had the fire going.English20·4 days agoIt’s the kind of tent that’s a semi-permanent structure and you rent it like a cabin.
From the sidebar:
If possible, when submitting please delete the “m.” from “en.m.wikipedia.org”. This will ensure people clicking from desktop will get the full Wikipedia website.
drspod@lemmy.mlto World News@lemmy.world•Italy: Man gets stuck driving car down Rome's Spanish StepsEnglish14·4 days agoThe Italian Job (1969)
drspod@lemmy.mlto World News@lemmy.world•Italy: Man gets stuck driving car down Rome's Spanish StepsEnglish22·4 days agoHis mistake was not driving a Mini Cooper.
drspod@lemmy.mlto Technology@lemmy.world•JD Vance gets suspended from Bluesky 'just 12 minutes after first post': reportsEnglish658·5 days agoImagine not being American and having to read about the American soap opera in your technology community and everywhere else.
drspod@lemmy.mlto Technology@lemmy.world•OpenAI supremo Sam Altman says he 'doesn't know how' he would have taken care of his baby without the help of ChatGPTEnglish3·5 days agoDon’t get high on your own supply.
drspod@lemmy.mlto Technology@lemmy.world•16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act NowEnglish6·5 days agoThis forbes blog is about this article:
https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/
The only silver lining here is that all of the datasets were exposed only briefly: long enough for researchers to uncover them, but not long enough to find who was controlling vast amounts of data. Most of the datasets were temporarily accessible through unsecured Elasticsearch or object storage instances.
So there isn’t really an explanation other than “somebody collected these somehow and left the data unsecured.”
The attack vector for infostealer malware is usually social engineering, getting unwary users to download infected trojanized software via phishing and malvertising etc.
If you follow security news, you will see articles about infostealer malware campaigns all the time.
https://www.theregister.com/2025/06/18/minecraft_mod_malware/
https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html
https://thehackernews.com/2025/06/rust-based-myth-stealer-malware-spread.html
https://thehackernews.com/2025/05/eddiestealer-malware-uses-clickfix.html
drspod@lemmy.mlto Technology@lemmy.world•16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act NowEnglish23·5 days agoThis article is about credentials that are stolen directly from users’ devices that are compromised with malware. So they will be that user’s passwords for whatever services they were using while infected with the malware. This is why the dumps contain passwords for just about every online service that exists.
This isn’t an actual database breach of the major providers.
drspod@lemmy.mlto Technology@lemmy.world•16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act NowEnglish13·5 days agoI wouldn’t rely on software running on the (potentially infected) system, since all malware these days will attempt to turn off or evade antivirus tools.
If you believe your device is compromised then you should wipe it and reinstall the OS. You should also delete any executable files on external media (secondary drives etc.) that may have been infected (eg. any setup.exe programs or portable exes), or at the very least verify the cryptographic hashes of those files if possible.
If you want to know if your credentials appear in a breach then search on Have I Been Pwned?. If it says your password appeared in an “infostealer dump” then you know that it was stolen directly from your device and you need to wipe it. If it was just the website that was breached then it wasn’t you personally that was hacked and you should just change your password.
drspod@lemmy.mlto Technology@lemmy.world•16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act NowEnglish46·5 days agoIf your credentials are in an infostealer dump then you need to make sure that you’ve removed the malware from your device(s) before changing your passwords. Otherwise your new passwords will be sent straight to the same people who got them the first time.
finallyyyyyyyyyyy