It all comes down to greed and enshitification in the end.
It all comes down to greed and enshitification in the end.
Will look for it, thanks.
Need an aquatic version for Nessie.
Actually, politicians give up public privacy under the fiction of helping children, repeatedly.
I cringe every time “online” and “children” are uttered in the same breath.
“Brighter than a 30 watt lightbulb.”, yep, have to agree.
This is the poster child for enshittification; RIP bluebird, we salute what you were.
In a perfect world maybe it would work that way, but I’ve seen too much enshittifaction via vertical integration or ego driven CEObros to have anything but skepticism for industry regulation, self-regulation in particular.
“This highlights issues with A-I generated content crowding out human writers and the need for Google to better regulate such sites to ensure quality.”
Can agree with the first part of that statement, but Google regulating…feels like handing a fox the keys to the hen house.
Regulation of industry should be coming from our legislators, but they’re too busy polarizing their base, abasing themselves to donors and gilding their own cages to care.
Apologies for the rant, but this whole “AI” imbroglio is a textbook case of the cart put before the horse whilst heading downhill.
The meat of the matter?
“Microsoft had said that Outlook.com and Exchange Online were the only applications known to have been affected via the token forging technique, but Wiz Research has found that the compromised signing key was more powerful than it may have seemed, and was not limited to just those two services. Our researchers concluded that the compromised MSA key could have allowed the threat actor to forge access tokens for multiple types of Azure Active Directory applications, including every application that supports personal account authentication, such as SharePoint, Teams, OneDrive, customers’ applications that support the “login with Microsoft” functionality, and multi-tenant applications in certain conditions.
In addition, while Microsoft mitigated this risk by revoking the impacted encryption key and publishing attacker IOCs, we discovered that it may be difficult for customers to detect the use of forged tokens against their applications due to lack of logs on crucial fields related to the token verification process.”
^ This.
Have been given a current Surface Pro laptop for work and must use an external mouse, or rage in frustration that my 13 yo MBP has a better functioning trackpad.