This was their stance 2 months ago:
I don’t think that would have changed if not for the backlash Microsoft has received for it.
Now, supposedly it’s optional and off by default, but that could change again anytime…
🇨🇦
This was their stance 2 months ago:
I don’t think that would have changed if not for the backlash Microsoft has received for it.
Now, supposedly it’s optional and off by default, but that could change again anytime…
Telus is the one that’s sent me dozens of notices; they don’t care. They just pass on the message they received and wash their hands.
In Canada, I get letters (well emails) when I rawdawg some torrents; but it’s never gone further than that.
Prior to using usenet, I constantly torrented w/o a VPN (talking 10+ TB of data across 3ish years) and received a new email notice or two every other day. I’ve still got a folder with 60+ notices. ISP doesn’t give af, they just forward the copyright notice in the form it was sent to them, and that’s it.
Now though I primarily use usenet and haven’t gotten a notice since. Downloads are also way way more reliable and faster.
That’s covered in the article you’re commenting on.
Another user on GitHub also pointed out that Microsoft’s own DISM can be used to disable the Recall service without the File Explorer consequences, although Titus points out that this behaviour seems inconsistent, as in his testing, the File Explorer still changed its appearance after a restart. Inconsistency aside, it’s unlikely that any non-technical Windows user will even know what DISM is, never mind how to use it, and this reliance on a command-line utility to remove a controversial feature is indicative of MIcrosoft’s goals.
Because 2 letter tlds are reserved to be issued to countries. Ideally the country’s 2 letter country code.
https://en.m.wikipedia.org/wiki/Country_code_top-level_domain
All ASCII ccTLD identifiers are two letters long, and all two-letter top-level domains are ccTLDs.
at least for the technology-related domains.
It’s not a technology related domain though; it’s a country’s domain that happens to be used for a lot of tech.
With the country dissolving, the domain does too, so it can become available for future countries.
So the .su domain was handed to Russia to operate alongside its own (.ru). The Russian government agreed that it would eventually be shut down, but no clear rules around its governance or when that should happen were defined.
But ambiguity is the worst thing for a top-level domain. Unknowingly, this decision created an environment in which .su became a digital wild west. Today, it is a barely policed top-level domain, a plausibly deniable home for Russian dark ops and a place where supremacist content and cyber-crime have found cover.
I seems IANA would like to not repeat past mistakes.
Considering how old Facebook is, you’d think they would have their shit together when it comes to password security…
it doesn’t necessarily take full resolution images
just because it can capture images a few hundred milliseconds apart doesn’t mean it’s continuously capturing images. It could be several in short bursts with a delay between groups of images.
To be fair, they aren’t specifically targeting this data.
Rootkits give the software unrestricted access to all the data on the computer. You then trust that they don’t use that access for anything nefarious… Aswell as trusting there’s no bugs/vulnerabilities in that software that give a third party access to that data.
While I haven’t looked into this particular anti-cheat; they frequently prevent Linux users from playing altogether, ban users due to false positives, and sometimes even gain/require access to data entirely unrelated to gaming, such as your personal documents or even browser data (cookies, history, passwords/tokens, etc) as many of them contain Rootkits
There’s a video in the article showing the whole process. The new module was completely hidden inside the calculators case and soldered to the internal connections.
Until you actually open it up, it doesn’t look abnormal at all.
Issued by the school; I never owned it.
Back when we were doing quadratic equations; I wrote a program on my TI-84 that would ask which parts of the equation you already had, and would fill in the rest for you.
My teacher liked it so much he bought a transfer cable for those calculators so he could get a copy for himself. Then used to to grade tests.
If they are like me, they have probably already found ways to watch porn, monitor their crush’s computer, read their email, and get into their webcam.
I got into quite a bit of similar mischief as a (pre)teen; but I didn’t do any of it on equipment that I knew was monitored (at least, monitored and signed out to me…)
And again; I think that’s a bit of a separate issue. These devices shouldn’t be equipped with cameras, let alone have the camera monitored/accessible.
The actual activity happening on the device; running applications, what’s on screen/in storage, even it’s location (with informed notice of said tracking) sure. but there’s no need to monitor/access the camera regardless of how or where the device is used.
A simple piece of tape fixes this problem. (plus education to teach students why, ofc)
kids take these computers home
I feel like that is the bigger problem. These aren’t private/personal devices; students shouldn’t be treating them as personal devices. Especially knowing it’s a monitored device.
Properly educating students on the use of these devices is the solution. Not telling schools to turn a blind eye to the use of their own equipment.
Yeah, when i was in school; there were no devices issued to students. We had ‘computer labs’. Ie; a room full of computers for student use. There was always one computer for the teachers to use that had a remote-desktop interface monitoring every screen in the room live. They could always see what you were doing, lockout your keyboard/mouse, blank your display.
This really doesn’t seem any different.
I could understand outrage if students were require to install this on their own hardware; but school issued devices are under the schools monitoring and control. Always have been.
Some more reading, for those following along:
(Oct 11th) https://www.notebookcheck.net/Removing-Windows-Recall-breaks-File-Explorer-in-latest-24H2-update.899991.0.html