Forgot your password?
typodupeerror

Comment Not every hobby should be a career (Score 1) 141

Arts and Humanities are fine....as pursuits of the leisure class who don't need to make living from them, or for people who work for a living to enjoy as hobbies.

Everyone is free to enjoy arts and humanities, but it's cruel to encourage expectations of gainful employment and silly to expect to
make a living from them. Confusing jobs and careers with hobbies can be financially deadly, so I didn't.

Careers fund hobbies so you can enjoy both. For example I can afford to collect and restore classic motorcycles because I did not try to make it a business. In consequence I easily afforded a well equipped personal workshop instead of starving for years to establish a financially vulnerable business. Fixing fighters paid much better.

Comment Trust is a vulnerability. (Score 2) 95

It's silly to trust other nations with one's data because the nation one made friendly arrangements with can replace the administration you trusted and purge its appointees.

Europe should not want any but FOSS because proprietary software only belongs to its creator. To use it is submission to its owners. The cost to European governments to code any software required is a trifle compared to relying on the kindness of their enemies.

No non-corrupt reasons exist to want the shackles of proprietary software. That's like wanting proprietary speech.

Submission + - Data factories dump costs to citizens (tomshardware.com)

noshellswill writes: Rather than pay for build-out of supporting electric power infrastructure, data-centers try passing that cost off to taxpayers. And the pass-off cost is not proportional to use as Maryland taxpayers discover.

Comment Choose like the first time SSD were expensive (Score 1) 70

When prices change, evaluate priorities.

If a tool costs a thousand dollars but will generate sufficient profit or save time or add convenience to justify the expense, I'd buy the tool. A thousand bucks is quite affordable for many skilled trades machine budgets. Tradespeople are normal people too.

If a thousand bucks is not affordable, choose different parts accordingly, for example using multiple smaller and/or different storage drives.

If a toy costs a thousand dollars and that is too expensive, choose a different toy or save up for one you prefer. It's easy to not buy new hardware which doesn't make one money.

If buying the entire machine at once is unaffordable, buy parts gradually.
If a used machine solves one's problem for less money, buy proven used PCs.

Submission + - Chrome silent install of 4GB AI model without consent gets expensive. (thatprivacyguy.com)

couchslug writes: Widespread unasked for downloads devour bandwidth squandering energy:

From the parent article:

"Two weeks ago I wrote about Anthropic silently registering a Native Messaging bridge in seven Chromium-based browsers on every machine where Claude Desktop was installed [1]. The pattern was: install on user launch of product A, write configuration into the user's installs of products B, C, D, E, F, G, H without asking. Reach across vendor trust boundaries. No consent dialog. No opt-out UI. Re-installs itself if the user removes it manually, every time Claude Desktop is launched.

This week I discovered the same pattern, executed by Google. Google Chrome is reaching into users' machines and writing a 4 GB on-device AI model file to disk without asking. The file is named weights.bin. It lives in OptGuideOnDeviceModel. It is the weights for Gemini Nano, Google's on-device LLM. Chrome did not ask. Chrome does not surface it. If the user deletes it, Chrome re-downloads it.

The legal analysis is the same one I gave for the Anthropic case. The environmental analysis is new. At Chrome's scale, the climate bill for one model push, paid in atmospheric CO2 by the entire planet, is between six thousand and sixty thousand tonnes of CO2-equivalent emissions, depending on how many devices receive the push. That is the environmental cost of one company unilaterally deciding that two billion peoples' default browser will mass-distribute a 4 GB binary they did not request."

Submission + - Canvas hacked and down (bleepingcomputer.com)

tphb writes: In the middle of final's season, Instructure Canvas, the widely used learning management system for thousands of schools and universities such as Harvard, Colorado, and Georgia tech has been hacked and is currently down. Per a report from Bleeping Computer, the company reported a breach on May 1. Today, school landing pages were replaced by a message from the hacking consortium ShinyHunters claiming that they would release the data by May 12th unless a ransom is paid. Shortly thereafter all school landing sites went offline for "maintenance".

Submission + - The first segment of the Fehmarnbelt megatunnel project is placed.

Qbertino writes: The Fehrmarnbelt Tunnel is a European construction megaproject building a tunnel between Denmark and Germany, crossing the Fehmarnbelt in the Baltic sea. The first segment of the tunnel has now successfully been placed in its designated spot. This is a yet unseen next-level engineering feat achived by the Danish Sund & Baelt construction company. It took 14 hours and used a massive pontoon ship built specifically for this project. The tunnel segments are 217 meters long, weigh more than 73.000 metric tons and have to be placed within a tolerance of 3mm. The tunnel will eventually consist of 89 of these segments, be 18 km long and connect the Danish city of Rodby with the German island Fehmarn with five individual tunnel tubes, 2 for cars, 2 for trains and one rescue & maintenance tunnel. Crossing time will be reduced from a 45 minute ferry crossing to 7 minutes by train or 10 minutes by car and cut the travel time between the German city of Hamburg and the Danish Capital Kopenhagen down to 2,5 hours. The projects planned completion is set for the year 2029. German news Tagesschau has some details and a neat animation showing details, the German technews site heise.de has some further details.

Comment Is the workstation tool or toy? (Score 1) 70

If the workstation's purpose is your job it may be worth upgrading. That's easily measured with money.

If it's solely a toy, decide how much fun you can effortlessly afford.
Non-bleeding edge PCs still do what they were bought to do.

There are many ways to enjoy computers. Home lab enthusiasts assign roles to their computers to conveniently offload tasks and if so inclined run a variety of OS. Retro gamers often have multiple PCs to suit their OS and software of choice.

Comment Used server boards handle that nicely. (Score 1) 70

Users with leftover RAM modules have ways to use them including used server boards which are plentiful and cheap in complete systems. Not requiring some "ideal" PC is liberating.

The cost-effective way to use ewaste is mixing it with other ewaste which has become quite popular, "home lab" enthusiasts being common examples. Another way is using multiple SFF and tiny PCs so each machine can be optimized by the owner. They don't use many modules, but 8 or 16GB can be useful if loads are reasonably limited.

Submission + - Microsoft Issues Warning About Linux Vulnerability (linux-magazine.com)

joshuark writes: Linux Magazine reports that Microsoft has issued a warning that a vulnerability with a CVSS score of 7.8 has been found in the Linux kernel. The vulnerability in question is tagged CVE-2026-31431 and, according to the Cybersecurity and Infrastructure Security Agency (CISA), "This Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise."
The distributions affected are Ubuntu, Red Hat, SUSE, Debian, Fedora, Arch Linux, and Amazon Linux. This could also affect any distribution based on those in the list, which means pretty much every Linux distro that isn't independent.
The flaw is found in the Linux kernel cryptographic subsystem's algif_aead module of AF_ALG. The problem is that a particular optimization has led to the kernel reusing the source memory as the destination during cryptographic operations. What this means is that attackers can take advantage of interactions between the AF_ALG socket interface and a splice() system call.
Currently, active exploitation of the vulnerability is limited to proof-of-concept (PoC) demonstrations. Until patches are released, Microsoft is advising that the affected crypto feature should be disabled, or AF_ALG socket creation should be blocked.

Submission + - Google Quietly Pushing 4GB AI Models Through Chrome Without Clear User Consent (tomshardware.com)

boopitybooperson writes: Security researcher Alexander Hanff claims Google Chrome is silently downloading a roughly 4GB Gemini Nano AI model (âoeweights.binâ) onto eligible devices without a clear opt-in or meaningful user notification. According to testing covered by Tomâ(TM)s Hardware, Chrome evaluates device hardware in the background and automatically deploys the model locally for on-device AI features. The file reportedly re-downloads even after manual deletion unless users disable experimental settings or remove Chrome entirely.

Submission + - No One Can Define 'Ultra-Processed Food.' Why Is RFK Jr. Trying To Regulate It? (reason.com)

fjo3 writes: Health and Human Services Secretary Robert F. Kennedy Jr. has promised to crack down on ultra-processed foods, a key policy priority of the Make America Healthy Again (MAHA) agenda. The biggest obstacle standing in his way? Figuring out what an ultra-processed food is.

"By April, we will have a federal definition of ultra-processed foods," RFK Jr. promised on The Joe Rogan Experience in February. "Every food in your grocery store will have a label on it—it'll have maybe a green light, red light, or yellow light, telling you whether or not it's going to be good for you."

The agency is now weeks behind this deadline, and appears to be no closer to landing on a definition. As The New York Times recently reported, "behind the scenesthe process of defining ultraprocessed foods is still very much in the air. Agencies are struggling to agree, and it is unclear when a definition will be released."

Submission + - Microsoft Edge Stores Passwords in Plaintext in RAM (pcmag.com)

UnknowingFool writes: Security researcher Tom Jøran Sønstebyseter Rønning has found that Microsoft Edge stores passwords in plain text in RAM. After creating a password and storing it using Edge's password manager, Rønning found that he could dump the RAM and recover his password which was stored in plain text. Part of the issue is Edge loads all passwords to all sites upon a single verification check even if the user was not visiting a specific site. This is very different from Chrome which only loads passwords for specific websites when challenged for the site's password. Also Chrome will delete the password from memory once the password has been filled. Edge does not delete the passwords from memory once they are used.

Microsoft downplayed the risk noting access would require control over a user's PC like a malware infection: “Access to browser data as described in the reported scenario would require the device to already be compromised,” Microsoft said. Rønning countered that it was possible to dump passwords for multiple users using administrative privileges for one user to view the passwords for other logged-on users.

Slashdot Top Deals

It is not for me to attempt to fathom the inscrutable workings of Providence. -- The Earl of Birkenhead

Working...