So in a way, some Kenyans have taken the work of some other Kenyans, in what looks like a dystopia: “OpenAI Used Kenyan Workers on Less Than $2 Per Hour to Make ChatGPT Less Toxic” [0]
Guess what, #1 is illegal in France: “Nul ne peut, dans l'espace public, porter une tenue destinée à dissimuler son visage”[0] (No one may, in the public space, wear clothing intended to conceal his face). Anti-facial recognition makeup should be fine, though. For the time being.
Exactly. "[A Norwegian philosopher] claims humans are born with a blood alcohol content that's 0.05% too low." A movie directed by Thomas Vinterberg. The trailer: https://www.youtube.com/watch?v=bj8Jmz_srDg
Well, double colon :: is just as convenient, make more sense and not a problem in either French or English. Even in English, you might want to stick an emoji to the previous word. Like Hell::devil:: (my nephew would like that though).
Double colon would make talking about perl even worse (:: is namespace separator) -- it's already bad enough that any namespace starting with D becomes an emoticon in pretty much all online editors.
This stuff should just stop. Operating Systems / Browser vendors should instead standardize on a hotkey to bring up an emoji selector that steals focus to filter via typing and inserts on enter key.
> The launch of the pilot phase of EU Voice and EU Video will help the EDPS to test the platforms in practice by collecting feedback from participating EUIs. The EDPS hopes that this first step will mark a continuity in the use of privacy-compliant social media platforms.
> EU Voice is open for registrations only to EU institutions, body and agencies. However, you can still interact with EU Voice from many other compatible platforms. The Mastodon developers maintain a list of Mastodon platforms open for registration.
DeepL Translation: According to documents obtained by Disclose and Der Spiegel from European institutions, the Swedish company MSAB has provided the Moroccan police with a software called XRY capable of unlocking all types of smartphones to extract data from calls, contacts, location, but also messages sent and received by SMS, WhatsApp and Signal. As for Oxygen forensic, domiciled in the United States, it has delivered a data extraction and analysis system called "Detective". What makes it special? Bypassing screen locks on mobile devices in order to extract information stored in the cloud (Google, Microsoft or Apple) or secure applications on any phone or computer. The notable difference with Pegasus software is that both software require physical access to the mobile device to be hacked, and do not allow remote monitoring.
Both XRY and Oxigen are AFAIK "common" and "established" forensics tools, unless the versions provided to Morocco are "special" there is nothing particularly "alarming" or "new/revolutionary", let alone "secret" about them,
I fully expect authorities from any countries to try to get evidences from physical access to electronic devices in the case of criminal investigation. Just like they can go into ones house and open safes with a torch if a judge allows it.
The problem is mass surveillance, not getting data about someone under arrest.
Of course, I unfortunatly also fully expect them to abuse that and use it outside of criminal investigations, without the knowledge of said person.
Apple may state that their enclave is secure, the existance of such tools and the fact they were part of PRISM hints that they are like all others: open to those with a lot of resources.
The manufacturers do their best to protect the users, but when it comes to criminal investigations there are tools[0] that can often make access to smartphone (or computers) data possible.
These tools are often prohibitively expensive and/or only licensed to LEO's (Law Enforcement Officers) and cannot unlock/access "everything", so there is no real "privacy risk" connected to them unless you are charged with a criminal offence and/or arrested.
To give you an example there are cases where an iPhone can be unlocked by two (AFAIK) different tools, one is made by Cellebrite that charges an awful amount of money for each unlock, and the other is Graykey that wants as well a lot of money but you can buy the "unlimited" option:
both are only given to authorized investigators (Police/Government) only.
Of course it is possible - in theory - that someone malicious manages to get their hands on one of them and then proceeds to steal the phone from you, and then can afford to spend anything between 3,000 and 10,000 US$ to unlock it and access your data, but I find it improbable.
[0] until the manufacturer patches (if patchable) the vulnerability, and then the race starts to find a new one
[0] https://time.com/6247678/openai-chatgpt-kenya-workers/