Feed Berlin Hack and Tell / @BerlinHacknTell [copy] http://shalnoff.co.uk/rss.php?rss=BerlinHacknTell has loading error: cURL error 22: The requested URL returned error: 403 Forbidden
Feed cleverhans-blog [copy] http://www.cleverhans.io/feed.xml has loading error: cURL error 22: The requested URL returned error: 404
Feed Security (b)log [copy] http://securityblogru.livejournal.com/data/rss has loading error: cURL error 22: The requested URL returned error: 403 Forbidden
Feed [bodyawm] Богдан [copy] https://habr.com/ru/rss/users/bodyawm/articles/?fl=ru has loading error: cURL error 22: The requested URL returned error: 404

From the Browser to the Bloodstream

When a company collapses, its debts and assets are tallied, auctioned, and parceled out. But what happens when the “asset” in question is your very biology? That’s the question millions of 23andMe customers now face in the wake of the company’s bankruptcy.

The post From the Browser to the Bloodstream appeared first on Purism.

Purism
Posted at 2025-10-02 15:20:18 | Tech | read on

Dialing Back to Move Forward: Why the Landline Revival Signals a Future for Privacy

On September 30, 2025, The Washington Post reported a quiet trend in Washington, D.C.: the return of landline phones among officials and journalists seeking refuge from the omnipresent surveillance of smartphones. In a recent story, NBC News spotlighted parents in Maine and Seattle who are reviving landlines for their children—creating “landline pods” so kids can connect without the addictive pull of screens or the predatory reach of social media platforms.

The post Dialing Back to Move Forward: Why the Landline Revival Signals a Future for Privacy appeared first on Purism.

Purism
Posted at 2025-10-01 15:55:47 | Tech | read on

Who Owns Your Digital Self?

The lawsuits now circling Apple are not just about stolen phones. They are about stolen selves—stolen data, stolen memories, stolen identities.

The post Who Owns Your Digital Self? appeared first on Purism.

Purism
Posted at 2025-10-01 14:52:09 | Tech | read on

The Power of a Movement: Why Argentina in 2025 Is the Right Place for RWA

Crecimiento is here to prove what’s possible when talent, tech, and urgency collide in Argentina.

Protocol Labs
Posted at 2025-09-29 00:00:00 | Tech | read on

Quantum Safe Private Communications: Building the Future Before the Threat Arrives

Secure mobility is not just about encryption — it’s about sovereignty. The ability to own, control, and verify every layer of your communications stack is the difference between operational assurance and strategic vulnerability.

The post Quantum Safe Private Communications: Building the Future Before the Threat Arrives appeared first on Purism.

Purism
Posted at 2025-09-26 20:56:28 | Tech | read on

BugTraq.Ru: Фишинговая атака на Python-разработчиков

Python Software Foundation предупреждает разработчиков о массовой рассылке, предлагающей залогиниться на поддельном PyPI-сайте "для верификации почтового адреса". С учетом того, что на PyPI размещено более 680 тысяч проектов, это делает его заманчивой целью для атак класса supply chain (и третьей крупной атакой за этот месяц с учетом двух предыдущих атак на NPM).
обсуждение | Telegram

BugTraq.Ru
Posted at 2025-09-26 14:21:00 | Tech | read on

Mapping the AI Universe: The Hugging Face Model Atlas

Hugging Face has become the default repository for modern AI models. What started as a hub for NLP research has grown into a platform that now hosts over two million models, spanning every domain of machine learning — from large language models and diffusion systems to niche fine-tunes for biomedical text, speech synthesis, or financial forecasting.

This success, however, creates a new difficulty: scale. With millions of models available, it has become nearly impossible to maintain an overview of what exists, how models relate to one another, and where innovation is actually happening. Traditional search and tagging systems are not enough...

SmartLab
Posted at 2025-09-26 04:29:09 | Tech | read on

Safety Without Surveillance: Designing Digital Sovereignty for All Ages

In September, a single misconfiguration in Life360’s Android API turned a “family safety” app into a map of human lives exposed. More than 442,000 users had their precise GPS trails, names, and phone numbers dumped online by a threat actor known as Emo.

The post Safety Without Surveillance: Designing Digital Sovereignty for All Ages appeared first on Purism.

Purism
Posted at 2025-09-25 14:41:11 | Tech | read on

GNUnet 0.25.1

GNUnet 0.25.1

This is a bugfix release for gnunet 0.25.0. It fixes some regressions and minor bugs.

Links Source: https://ftpmirror.gnu.org/gnunet/gnunet-0.25.1.tar.gz ( https://ftpmirror.gnu.org/gnunet/gnunet-0.25.1.tar.gz.sig ) Detailed list of changes: ...

GNUnet blogs
Posted at 2025-09-23 22:00:00 | Tech | read on

Secret Service Telecom Bust Exposes Cellular Weaknesses

The Secret Service’s disruption of a massive SIM-server network near the U.N. is proof that the threats to our communications are real, organized, and capable of overwhelming public safety systems.

The post Secret Service Telecom Bust Exposes Cellular Weaknesses appeared first on Purism.

Purism
Posted at 2025-09-23 19:31:07 | Tech | read on
1 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 51

***

Однажды китайский ученый Ли Хунь Янь обнаружил некоторую незначительную, однако, существенно отличающуюся от фона корреляцию между количеством псилоцибина потребляемого корфуцианскими медузами и характером передвижения оных по стенкам четырехсотлитровго шарообразного аквариума, установленного в лаборатории по случаю празднования сто второго полугодичного затмения от начала новой эры Сингулярного Прорыва. Недолго думая, Ли Хунь Янь приделал к щупальцам медуз источники излучения в видимом диапазоне но с разной длинной волны, заснял весь процесс шестью камерами с 48 часовой выдержкой, симметрично расставив последние вокруг сосуда, где резвились подопытные и через неделю собрал прелюбопытнейший материал, который, в свою очередь, лег в основу фундаментального труда, ныне известного, как теория полутретичных n-многообразий простой метрики Ли Хунь Янь, с которой (с некоторыми упрощениями и оговорками) я, по мере сил, постараюсь познакомить любопытного и пытливого читателя.

Recently