iPhones have been exposing your unique MAC despite Apple’s promises otherwise Interview Questions That The Smartest Candidates Are Asking– It’s your one chance to ask the questions that can help you make the right decision, so ask. Four-day work week trial in Spain leads to healthier workers, less pollution You’ll never be solo again 50…
The article below points out that many of the platforms that exist today may find themselves in a similar situation and face a similar temptation. As shareholders start demanding more “growth” of a platform they are going to have a hard time providing that. There isn’t a large group of people clamoring to get Twitter or Facebook accounts that don’t currently have one. Eventually, they may be tempted to provide some kind of content exclusively on their platform. This pushes them into being publishing and media companies as opposed to tech companies. (We could argue that many of these platforms have started to dabble in being media companies but that haven’t quite taken the step that Spotify did and buy exclusive rights to podcasts.)
Ed Bott raises an interesting question about people using PCs that don’t meet the requirements in terms of hardware security for Windows 11 but who own otherwise perfectly fine computers. In 2025, when Microsoft stops patching Windows 10, how many computers will still be out there, in use, connected to the internet, and vulnerable.
But in the quote above, Ed raises another point that maybe we should be thinking about more. What happens to all the hardware that is no longer supported as technology advances? It ends up in a landfill. That’s not good. That’s not even acceptable.
At first blush, the idea of scanning images synced up to iCloud for child sexual abuse materials against the hash list of known CSAM images seems like a good idea. As a survivor of childhood sexual abuse myself, I want tech companies to takes some initiative to deal with this issue. They also want to scan images on kids’ phones using AI to see if kids are getting into any trouble with sending or receiving sexual material. Again, that sounds like a good thing. But, as the EFF points out, this all requires a backdoor, and backdoors, once created, almost never remain used for just one purpose.