Meta shares first timeline details for WhatsApp username support
9to5mac.comΒ·17h
πFediverse
Flag this post
A Comprehensive Dataset for Investigating the Structure of Self-Bias
nature.comΒ·23h
πFediverse
Flag this post
Dumbphones and the spam filtering tradeoff
terracrypt.netΒ·21h
πFediverse
Flag this post
Former Meta employees launch Stream, a smart ring that takes voice notes and controls music - TechCrunch
news.google.comΒ·2d
πFediverse
Flag this post
State Privacy Laws in Action: Enforcement and Litigation in 2025
pandectes.ioΒ·4d
βDigital Activism
Flag this post
An Idea to Not Get Phished
πΈοΈMesh Networks
Flag this post
Truth, trust & tricksters
eurozine.comΒ·2d
π΄ββ οΈCyberpunk
Flag this post
Umami v3: Google Analytics Alternative with New Tracking Features
heise.deΒ·1h
πFediverse
Flag this post
Browse free and safe with this tiny VPN router, now $50 off in time for holiday travel
mashable.comΒ·3h
πΈοΈMesh Networks
Flag this post
Magentic Marketplace: an open-source simulation environment for studying agentic markets
microsoft.comΒ·1d
πΈοΈMesh Networks
Flag this post
Google Gemini can now read all your emails and documents
the-independent.comΒ·21h
πFediverse
Flag this post
Facade Pattern β Catalog of Enterprise Application Architecture Patterns π’
π£οΈDomain-Specific Languages
Flag this post
The CHAT Act Won't Protect Kids, But it Might Break the Internet.
reason.comΒ·1d
π΄ββ οΈCyberpunk
Flag this post
World Digital Preservation Day
digitalpreservation.noΒ·1d
βDigital Activism
Flag this post
Part 4: Daily Security Habits
π΄ββ οΈCyberpunk
Flag this post
Beware of double agents: How AI can fortify β or fracture β your cybersecurity
blogs.microsoft.comΒ·1d
π€Cooperative Tech
Flag this post
Great, now even malware is using LLMs to rewrite its code, says Google, as it documents new phase of 'AI abuse'
π΄ββ οΈCyberpunk
Flag this post
Cryptoβs Anti-Surveillance Boom: Zcash, Monero and the Return of Anonymity
coindesk.comΒ·1d
βDigital Activism
Flag this post
Loading...Loading more...