Skip to main content

Search

Items tagged with: technology


 
Hey everyone, I’m #newhere. I’m interested in #culture, #history, #science, and #technology.

 
‘Final straw’ was refusal to allow partner to mark dubious claims by far-right parties
Facebook's only Dutch factchecker quits over political ad exemption
#Facebook #Netherlands #Europe #Worldnews #Socialnetworking #Technology #Media

 

Invasive scheme spotted that foxes tracker blockers | TechCrunch

The tracker in question was spotted being deployed by French national newspaper, Liberation, which in October promised subscribers an entirely tracker-free experience.

That promise garnered it a bunch of attention from privacy experts who dug around and found a first-party tracker embedded on its site which uses a subdomain (that’s mostly random) in order to redirect to a third party — thereby making it difficult to block (i.e. without also blocking Liberation’s own domain).
#technology #internet #privacy #security #tracker
Invasive scheme spotted that foxes tracker blockers

 

Invasive scheme spotted that foxes tracker blockers | TechCrunch

The tracker in question was spotted being deployed by French national newspaper, Liberation, which in October promised subscribers an entirely tracker-free experience.

That promise garnered it a bunch of attention from privacy experts who dug around and found a first-party tracker embedded on its site which uses a subdomain (that’s mostly random) in order to redirect to a third party — thereby making it difficult to block (i.e. without also blocking Liberation’s own domain).
#technology #internet #privacy #security #tracker
Invasive scheme spotted that foxes tracker blockers

 

Opinion: AI For Good Is Often Bad | WIRED

Trying to solve poverty, crime, and disease with (often biased) technology doesn’t address their root causes.
Exactly. Technology alone does not solve social issues.

#technology #AI

 
Bild/Foto

House Of Cards


The only thing funnier that hearing from experts about computer technology frailties...

Is listening to those selfsame experts complain about problems in Real World™ systems, and How They Would Fix Them With TECHNOLOGY.

https://twitter.com/mattblaze/status/1192503673664016385

https://xkcd.com/2030/

#technology #tech #failure #experts #standards #regulation

 
Bild/Foto

House Of Cards


The only thing funnier that hearing from experts about computer technology frailties...

Is listening to those selfsame experts complain about problems in Real World™ systems, and How They Would Fix Them With TECHNOLOGY.

https://twitter.com/mattblaze/status/1192503673664016385

https://xkcd.com/2030/

#technology #tech #failure #experts #standards #regulation

 
Bild/Foto
An interesting technology comparison: How the movie "The Blade Runner" envisioned our technology in 2019 (the year the original movie is supposed to take place) and how it compares to real technology today

#Technology #Movies

Blade Runner: How well did the film predict 2019's tech?

 
Bild/Foto
An interesting technology comparison: How the movie "The Blade Runner" envisioned our technology in 2019 (the year the original movie is supposed to take place) and how it compares to real technology today

#Technology #Movies

Blade Runner: How well did the film predict 2019's tech?

 

Twitter bans all political advertising | BBC Breaking News

Twitter bans all political advertising, saying the reach of such messages "should be earned, not bought"

This breaking news story is being updated and more details will be published shortly. Please refresh the page for the fullest version.
That's the whole of story at this moment.

#tech #technology #twitter #politics

 

Twitter bans all political advertising | BBC Breaking News

Twitter bans all political advertising, saying the reach of such messages "should be earned, not bought"

This breaking news story is being updated and more details will be published shortly. Please refresh the page for the fullest version.
That's the whole of story at this moment.

#tech #technology #twitter #politics

 
Bild/Foto

#Technology doesn't change everything into better!


#lol #cat 🙀 #joke

 
The Internet Archive just added 10.5 PB to their storage, whis will be filled in 3-4 months.
#InternetArchive #TechPr0n #Technology

 
The Internet Archive just added 10.5 PB to their storage, whis will be filled in 3-4 months.
#InternetArchive #TechPr0n #Technology

 
Сделал блок питания в стиле макоронного монстра сегодня:


Made a spaghetti monster style power supply today.

Уже давно мне хотелось сделать датчик движения для включения и выключения света в некоторых местах. Для этого заранее приобрёл у китайских товарищей охапку датчиков, микроконтроллеров и реле - с этим не было проблем, проблемы были с блоками питания для этого. Как показывает практика автоматизации бытовых рутинных действий - блоки питания - это то, что вероятнее всего выйдет из строя через некоторое время при постоянном использовании. Поэтому решил попробовать сделать бестрансформаторный блок питания, для этого взял первую попавшуюся схему и более или менее подходящие радиодетали из старой электроники:


I wanted to make a motion sensor to turn on and off the light in some places. To do this, i bought a bunch of sensors, microcontrollers and relays from Chinese comrades in advance - there was no problem with it, but there were problems with power supplies for this. As the practice of automation of household routine actions shows - power supplies - is what will most likely fail after some time with constant use. Therefore, i decided to try to make a transformerless power supply unit, for this purpose i took some scheme and more or less suitable radio components from the old electronics.

Плёночный конденсатор C1 - это ключевой элемент этого блока питания. У меня не было необходимых высоковольтных - поэтому сначала я использовал те, что на 250 вольт. Оказалось, что 0.44 микрофарад - этого достаточно для микроконтроллера, но уже недостаточно для работы реле. Также после 15 минут работы, 250 вольтные конденсаторы не выдержали нагрузки (их "пробило"). Поэтому в финальной схеме блока питания для этого незамысловатого устройства указан конденсатор ёмкостью 1 микрофорад 630 вольт:


The C1 film capacitor is a key element of this power supply. I didn't have the necessary high voltage capacitors - so i used the 250 volt capacitors first. It turned out that 0.44 micro-farad is enough for a microcontroller, but not enough for relay operation. Also after 15 minutes of operation, the 250 volt capacitors could not withstand the load (they were "punched"). Therefore, in the final circuit scheme of the power supply for this simple device is indicated film capacitor of 1 microforade 630 volts.

Вот так выглядит всё собранное устройство в стиле "макароны на брёвнышке" (использовал 4 последовательно-параллельно соединённых старых советских конденсатора 1 микрофарад 160 вольт, чтобы получить из них 1 микрофарад 320 вольт), украшенное примитивистскими орнаментами:


This is how the whole device looks like in the style of "macaroni on a log" (used 4 sequentially-parallel connected old soviet capacitors 1 microfarad 160 volts to get from them 1 microfarad 320 volts), decorated with primitive ornaments.

Раньше, чтобы набрать зерна из ларца приходилось включать свет:


I used to have to turn on the lights to get the grains out of the chest.

Теперь свет загорается если есть движение в помещении:


Now the light comes on if there's movement in the room.

Также стоит отметить, что для диодного моста VDS1 подойдут любые высоковольтные диоды, а стабилитрон VD1 оптимальнее всего подбирать для получения 7-9 вольт (я использовал старый Д814А, дающий 7,8 вольта). Для питания микроконтроллера необходимо 6-12 вольт.
На выходное напряжение в этом блоке питания влияют характеристики стабилитрона VD1. На выходную силу тока влияет ёмкость конденсатора C1.

It is also worth noting that for the diode bridge VDS1 will be suitable any high-voltage diodes, and Zener diode VD1 is best selected to obtain 7-9 volts for result (i used the old Д814А, giving 7.8 volts). To power a microcontroller it is necessary to supply 6-12 volts.
The output voltage in this power supply unit is affected by the characteristics of Zener diode VD1. The output current is affected by the capacitance of the capacitor C1.

Вероятно, позже добавлю модуль фоторезистора (для уличной лампы, чтобы не включалась днём) и сетевого устройства (для удалённого управления освещением и обработки данных с сенсора). А вот код для контроллера:
const int lightDelay = 90000;<br></br>const byte movePin = 3;<br></br>const byte relayPin = 4;<br></br>long lastmoveMillis = 0;<br></br>void setup() {<br></br>  pinMode(movePin, INPUT);<br></br>  pinMode(relayPin, OUTPUT);<br></br>  digitalWrite(relayPin, HIGH);<br></br>}<br></br>void loop() {<br></br>  if (digitalRead(movePin) == 1) lastmoveMillis = millis();<br></br>  delay(100);<br></br>  if (lastmoveMillis > 0) activateRelay();<br></br>}<br></br>void activateRelay() {<br></br>  if ((millis() - lastmoveMillis) < lightDelay) digitalWrite(relayPin, LOW);<br></br>  if ((millis() - lastmoveMillis) > lightDelay) {<br></br>    digitalWrite(relayPin, HIGH);<br></br>    lastmoveMillis = 0;<br></br>  }<br></br>}

Here's the code for the controller. Probably later i'll add a photoresistor module (for street lamps not to be switched on during the day) and a network device (for remote lighting control and sensor data processing).

#automation #hardware #lightning #microcontrollers #motion #photo #powersupply #programming #recycling #sensor #relay #technology

 
Bild/Foto

beg for scraps ...


I post pictures / meme every day about anarchy and other cool stuff.
Feel free to download and share them ! :)

#shitposting #anarchist meme for cool people
#meme #capitalism #ads #movie #technology #tech #sf

 
Hi, I’m #newhere. Making the exodus from Google Plus in search of #meaningfulconversation. I used to be EcoTraveler over there. I have always been Josh. Not sure if that shows up here or not. My interests are #science, #technology, #crypto, #daytrading, #conservation, #spirituality, #mysticism, #occult. I tend to share memes I steal from other websites, but I try to keep the conversation civil and a few layers deeper than the mindless social drama you get on twitter.

Welcome my comrades from G+, and I hope to get a chance to meet the rest of you in time.

 

What We 'Know' About Facebook

On Friday, Gizmodo uncovered shocking new evidence that Facebook is using its platform to suppress stories about CEO Mark Zuckerberg... or maybe his janky, busted-ass website is just bugging out again for no reason. It’s hard to say, really. That’s sort of the problem.
#technology #internet #Facebook

 

What We 'Know' About Facebook

On Friday, Gizmodo uncovered shocking new evidence that Facebook is using its platform to suppress stories about CEO Mark Zuckerberg... or maybe his janky, busted-ass website is just bugging out again for no reason. It’s hard to say, really. That’s sort of the problem.
#technology #internet #Facebook

 
Guy Gets Doom Running On A McDonald's Cash Register

#doom #technology

 
Bild/Foto

Avoid Intel and AMD Universal Backdoors


Only use computers certified to Respect Your Freedom (RYF)

The #Intel #Management #Engine is present on all Intel #desktop, #mobile ( #laptop ), and #server #systems since mid 2006. It consists of an #ARC #processor core (replaced with other processor cores in later generations of the ME), #code and #data #caches, a #timer, and a secure #internal #bus to which additional #devices are connected, including a #cryptography engine, internal #ROM and #RAM, #memory #controllers, and a direct memory access ( #DMA ) engine to access the host operating system’s memory as well as to reserve a region of protected external memory to supplement the ME’s limited internal RAM. The ME also has #network access with its own #MAC #address through an Intel #Gigabit #Ethernet #Controller. Its #boot program, stored on the internal ROM, loads a #firmware “manifest” from the PC’s SPI #flash #chip. This manifest is signed with a strong #cryptographic #key, which differs between versions of the ME firmware. If the manifest isn’t signed by a specific Intel key, the boot ROM won’t load and execute the firmware and the ME processor core will be halted.

The Active Management Technology ( #AMT ) application, part of the Intel “vPro” brand, is a #Web server and application code that enables #remote #users to #power on, power off, view information about, and otherwise manage the #PC. It can be used remotely even while the PC is powered off ( via #Wake-on-Lan ). Traffic is encrypted using #SSL / #TLS libraries, but recall that all of the major SSL/TLS implementations have had highly publicized vulnerabilities. The AMT application itself has known #vulnerabilities, which have been #exploited to develop #rootkits and #keyloggers and #covertly gain #encrypted #access to the management features of a PC. Remember that the ME has full access to the PC’s RAM. This means that an #attacker exploiting any of these vulnerabilities may gain access to everything on the PC as it runs: all open #files, all running #applications, all #keys pressed, and more.

ME firmware versions 4.0 and later (Intel 4 Series and later chipsets) include an ME application for audio and video DRM called “Protected Audio Video Path” (PAVP). The ME receives from the #host operating system an encrypted #media #stream and encrypted key, decrypts the key, and sends the encrypted media decrypted key to the #GPU, which then #decrypts the media. PAVP is also used by another ME application to draw an #authentication PIN pad directly onto the screen. In this usage, the PAVP application directly controls the graphics that appear on the PC’s screen in a way that the host #OS cannot detect. ME firmware version 7.0 on PCHs with 2nd Generation Intel Core #i3 / #i5 / #i7 (Sandy Bridge) CPUs replaces PAVP with a similar DRM application called “Intel Insider”. Like the AMT application, these DRM applications, which in themselves are defective by design, demonstrate the #omnipotent #capabilities of the ME: this #hardware and its proprietary firmware can access and #control everything that is in RAM and even everything that is shown on the #screen.

The Intel Management Engine with its #proprietary firmware has complete access to and control over the PC: it can power on or shut down the PC, read all open files, examine all running applications, track all keys pressed and #mouse movements, and even #capture or #display #images on the screen. And it has a network interface that is demonstrably #insecure, which can allow an attacker on the network to #inject #rootkits that completely compromise the PC and can report to the attacker all activities performed on the PC. It is a #threat to #freedom, #security, and #privacy that can’t be ignored.

Before version 6.0 (that is, on systems from 2008/2009 and earlier), the ME can be disabled by setting a couple of values in the SPI flash memory. The ME firmware can then be #removed entirely from the flash memory space. Libreboot does this on the Intel 4 Series systems that it supports, such as the Libreboot X200 and Libreboot T400. ME firmware versions 6.0 and later, which are found on all systems with an Intel #Core i3/i5/i7 CPU and a PCH, include “ME Ignition” firmware that performs some hardware #initialization and power management. If the ME’s boot ROM does not find in the SPI flash memory an ME firmware manifest with a valid Intel signature, the whole PC will shut down after 30 minutes.

Due to the signature verification, developing free #replacement firmware for the ME is basically impossible. The only entity capable of replacing the ME firmware is Intel. As previously stated, the ME firmware includes proprietary code licensed from third parties, so Intel couldn’t release the source code even if they wanted to. And even if they developed completely new ME firmware without third-party proprietary code and released its source code, the ME’s boot ROM would reject any modified firmware that isn’t signed by Intel. Thus, the ME firmware is both hopelessly proprietary and #tivoized.

For years, #coreboot has been #struggling against Intel. Intel has been shown to be extremely uncooperative in general. Many coreboot #developers, and #companies, have tried to get Intel to #cooperate; namely, releasing source code for the firmware components. Even #Google, which sells millions of #Chromebooks (coreboot preinstalled) have been #unable to #persuade them.

Even when Intel does cooperate, they still don’t provide source code. They might provide limited #information (datasheets) under #strict #corporate #NDA ( #non-disclosure #agreement ), but even that is not guaranteed. Even ODMs and IBVs can’t get source code from Intel, in most cases (they will just integrate the blobs that Intel provides).

In summary, the Intel #Management #Engine and its applications are a #backdoor with #total access to and control over the rest of the PC. The ME is a threat to freedom, security, and privacy, and the Libreboot project strongly recommends avoiding it entirely. Since recent versions of it can’t be removed, this means avoiding all #recent #generations of Intel hardware.

Recent Intel graphics chipsets also require firmware blobs


Intel is only going to get #worse when it comes to user freedom. Libreboot has no support recent Intel platforms, precisely because of the problems described above. The only way to solve this is to get Intel to #change their #policies and to be more #friendly to the free software #community. Reverse engineering won’t solve anything long-term, unfortunately, but we need to keep doing it anyway. Moving forward, Intel hardware is a non-option unless a #radical change happens within Intel.

Basically, all Intel hardware from year 2010 and beyond will never be supported by Libreboot. The Libreboot project is actively #ignoring all modern Intel hardware at this point, and focusing on #alternative platforms.

Why is the latest AMD hardware unsupported in Libreboot?


It is extremely unlikely that any post-2013 #AMD hardware will ever be supported in Libreboot, due to severe security and freedom #issues; so #severe, that the Libreboot project recommends avoiding all modern AMD hardware. If you have an AMD based system affected by the #problems described below, then you should get rid of it as soon as possible.

AMD Platform Security Processor (PSP)


This is basically AMD’s own version of the Intel Management Engine. It has all of the same basic security and freedom issues, although the #implementation is wildly different.

The Platform Security Processor (PSP) is built in on all Family 16h + systems (basically anything post-2013), and controls the main #x86 core #startup. PSP firmware is cryptographically signed with a strong key similar to the Intel ME. If the PSP firmware is not present, or if the AMD signing key is not present, the #x86 cores will not be #released from #reset, rendering the system #inoperable.

The PSP is an ARM core with TrustZone #technology, built onto the main CPU die. As such, it has the ability to #hide its own program code, scratch RAM, and any data it may have taken and stored from the lesser-privileged x86 system RAM (kernel encryption keys, #login data, #browsing #history, #keystrokes, who knows!). To make matters worse, the PSP theoretically has access to the entire system memory space (AMD either will not or cannot deny this, and it would seem to be required to allow the DRM “features” to work as intended), which means that it has at minimum MMIO-based access to the #network controllers and any other PCI/PCIe peripherals installed on the #system.

In theory any #malicious entity with access to the AMD signing key would be able to install persistent #malware that could not be eradicated without an external flasher and a known good PSP image. Furthermore, multiple security vulnerabilities have been demonstrated in AMD #firmware in the #past, and there is every #reason to assume one or more zero day vulnerabilities are lurking in the PSP firmware. Given the extreme privilege level (ring -2 or ring -3) of the PSP, said vulnerabilities would have the ability to #remotely #monitor and control any PSP enabled machine completely outside of the user’s #knowledge.

A reliable way to avoid Intel and AMD’s universal backdoors is to use computers with such spyware effectively removed or disabled like the ones certified to Respect Your Freedom (RYF).

#NSA #spyware #spy #mass #surveillance #FSF #GNU #GNULinux #RYF #technology #laptops #CPU #processor #universal #backdoor #malware #Corei3 #Corei5 #Corei7

 

When the A.I. #Professor Leaves, #Students #Suffer, #Study Says


Source: https://www.nytimes.com/2019/09/06/technology/when-the-ai-professor-leaves-students-suffer-study-says.html
For years, big tech companies have used huge salaries, bonuses and stock packages to lure artificial #intelligence experts out of #academia.
...
The talent shift could accelerate the development of artificial intelligence inside tech giants like #Google, #Microsoft, #Amazon and #Apple.
But at the universities the professors left, graduating students were less likely to create new A.I. companies. When they did, they attracted smaller amounts of funding, according to the study. The effect was most pronounced in the field of “deep learning,” a #technology that has become a crucial part of new A.I. systems.
#news #capitalism #economy #education #University #money #science

 

When the A.I. #Professor Leaves, #Students #Suffer, #Study Says


Source: https://www.nytimes.com/2019/09/06/technology/when-the-ai-professor-leaves-students-suffer-study-says.html
For years, big tech companies have used huge salaries, bonuses and stock packages to lure artificial #intelligence experts out of #academia.
...
The talent shift could accelerate the development of artificial intelligence inside tech giants like #Google, #Microsoft, #Amazon and #Apple.
But at the universities the professors left, graduating students were less likely to create new A.I. companies. When they did, they attracted smaller amounts of funding, according to the study. The effect was most pronounced in the field of “deep learning,” a #technology that has become a crucial part of new A.I. systems.
#news #capitalism #economy #education #University #money #science

 

When the A.I. #Professor Leaves, #Students #Suffer, #Study Says


Source: https://www.nytimes.com/2019/09/06/technology/when-the-ai-professor-leaves-students-suffer-study-says.html
For years, big tech companies have used huge salaries, bonuses and stock packages to lure artificial #intelligence experts out of #academia.
...
The talent shift could accelerate the development of artificial intelligence inside tech giants like #Google, #Microsoft, #Amazon and #Apple.
But at the universities the professors left, graduating students were less likely to create new A.I. companies. When they did, they attracted smaller amounts of funding, according to the study. The effect was most pronounced in the field of “deep learning,” a #technology that has become a crucial part of new A.I. systems.
#news #capitalism #economy #education #University #money #science

 
It's been 40 years since Douglas Adams released The Hitchhiker’s Guide to the Galaxy on to an unsuspecting Earth. And it's still fun to read and to listen to (the radio series).

There must be something special planned for its 42nd Anniversary! 😃

An article on it by Nature.

#Humour #Comedy #DouglasAdams #Technology #Books #SFF

https://www.nature.com/articles/d41586-019-02969-8

 

Facebook will share encrypted messages with UK police | 9to5Mac

Bloomberg reports:
Social media platforms based in the U.S. including Facebook and WhatsApp will be forced to share users’ encrypted messages with British police under a new treaty between the two countries, according to a person familiar with the matter.
The accord, which is set to be signed by next month, will compel social media firms to share information to support investigations into individuals suspected of serious criminal offenses including terrorism and pedophilia, the person said
#technology #internet #Facebook #security #privacy
US-UK treaty means Facebook will share encrypted messages with UK police

 

Facebook will share encrypted messages with UK police | 9to5Mac

Bloomberg reports:
Social media platforms based in the U.S. including Facebook and WhatsApp will be forced to share users’ encrypted messages with British police under a new treaty between the two countries, according to a person familiar with the matter.
The accord, which is set to be signed by next month, will compel social media firms to share information to support investigations into individuals suspected of serious criminal offenses including terrorism and pedophilia, the person said
#technology #internet #Facebook #security #privacy
US-UK treaty means Facebook will share encrypted messages with UK police

 
Has anyone tested Tok Messenger?

Secure e2e, Distributed p2p, Anonymous, No Censorship, Open Source

https://www.tok.life

Privacy and security of Tok Tok was born with the sole mission of making our communication easier via modern technology. We assume that you would use Tok to share personal or special moments with extreme privacy, so we adopt peer-to-peer communication, end-to-end encryption in our application, which ensure your information with absolute privacy.

Do not require any Phone number
Phone number and Email address is not required to generate a Tok account, making sure that your personal information is not traceable through a real-name phone or email.

Invisible IP
Tok hidden all IP addresses through #onion #routing #encryption technology thus you will communicate with your friends via multiple routes so that no one except youself has access to your IP address, ensuring the privacy of the communication

Automatic message encryption
Your message is automaticly end-to-end encrypted when you send it to your friend via Tok. Many communication apps can only encrypt information, but Tok's end-to-end encryption technology ensures that only you and the recipient can read the information. End-to-end encryption technology locks information with special security keys, and only you and the recipient of the information will have the security keys to unlock and read the information. All information is automatically end-to-end encrypted, any more special setting to ensure the security of the information is unnecessary, and the world is free to communicate.

Private ownership of personal information
Tok insist that your information only belongs to you, so Tok’s peer-to-peer communication has no central server and thus can not store any of your information, After end-to-end encryption, any third party, including the Tok’s engineers, can't read the content of the information at all. Only you are the owner of your information, and the only authentication of ownership is your secret key. Please be sure to keep your key yourself and do not give it to anyone else.

#security #encryption #internet #p2p #e2e #opensource #surveillance #censorship #tor #technology #tok #android #ios

 
Has anyone tested Tok Messenger?

Secure e2e, Distributed p2p, Anonymous, No Censorship, Open Source

https://www.tok.life

Privacy and security of Tok Tok was born with the sole mission of making our communication easier via modern technology. We assume that you would use Tok to share personal or special moments with extreme privacy, so we adopt peer-to-peer communication, end-to-end encryption in our application, which ensure your information with absolute privacy.

Do not require any Phone number
Phone number and Email address is not required to generate a Tok account, making sure that your personal information is not traceable through a real-name phone or email.

Invisible IP
Tok hidden all IP addresses through #onion #routing #encryption technology thus you will communicate with your friends via multiple routes so that no one except youself has access to your IP address, ensuring the privacy of the communication

Automatic message encryption
Your message is automaticly end-to-end encrypted when you send it to your friend via Tok. Many communication apps can only encrypt information, but Tok's end-to-end encryption technology ensures that only you and the recipient can read the information. End-to-end encryption technology locks information with special security keys, and only you and the recipient of the information will have the security keys to unlock and read the information. All information is automatically end-to-end encrypted, any more special setting to ensure the security of the information is unnecessary, and the world is free to communicate.

Private ownership of personal information
Tok insist that your information only belongs to you, so Tok’s peer-to-peer communication has no central server and thus can not store any of your information, After end-to-end encryption, any third party, including the Tok’s engineers, can't read the content of the information at all. Only you are the owner of your information, and the only authentication of ownership is your secret key. Please be sure to keep your key yourself and do not give it to anyone else.

#security #encryption #internet #p2p #e2e #opensource #surveillance #censorship #tor #technology #tok #android #ios

 

Buggy Google Chrome Update Behind Recent Unbootable Macs


#security #apple #bleeping computer #bleepingcomputer #computers #technology #news #education #updates #tech
generated by pod_feeder_v2

 

Buggy Google Chrome Update Behind Recent Unbootable Macs


#security #apple #bleeping computer #bleepingcomputer #computers #technology #news #education #updates #tech
generated by pod_feeder_v2