"Querying a Section 702 database in connection with a US person generally requires a warrant, even where the initial interception was lawfully conducted," DeArcy Hall ruled, partly because US persons maintain "a legitimate expectation of privacy."
"The government cannot circumvent application of the warrant requirement simply because queried information is already collected and held by the government."
Volexity believes this represents a new class of attack that has not previously been described, in which a threat actor compromises one organization and performs credential-stuffing attacks in order to compromise other organizations in close physical proximity via their Wi-Fi networks.
But the deeper problem with making Musk the face of government "efficiency" is that efficiency is not an end unto itself. How well government operates is one question — an important one. But what government is for is a very different question.
On October 3, the British government announced that it was giving up sovereignty over a small tropical atoll in the Indian Ocean known as the Chagos Islands. The islands would be handed over to the neighboring island country of Mauritius, about 1,100 miles off the southeastern coast of Africa.
The story did not make the tech press, but perhaps it should have. The decision to transfer the islands to their new owner will result in the loss of one of the tech and gaming industry’s preferred top-level domains: .io.
A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers, potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests.
“Forgetting used to be the default, and that also meant you could edit your memories,” says Kate Eichhorn, who researches culture and media at the New School in New York City and wrote the book The End of Forgetting. “Editing memories” in this context refers to a psychological process, not a Photoshop tool. The human brain is constantly editing memories to incorporate new information and, in some cases, to cope with trauma.
When engineers build ad retargeting platforms, they build something that will continually funnel more content for the things you’ve indicated you’re interested in. [...] But these systems don’t factor in when life has been interrupted. Pinterest doesn’t know when the wedding never happens, or when the baby isn’t born.
A heartwarming story of the Internet's creativity.
Researchers found a flaw in a Kia web portal that let them track millions of cars, unlock doors, and start engines at will—the latest in a plague of web bugs that's affected a dozen carmakers.
This team of researchers has found many car-related bugs before. The vulnerability writeup is here.
New IETF standards take advantage of extra bits to produce time-sortable UUIDs. This can improve the locality of database keys and provide the ability to do a bit-by-bit comparison rather than parsing.
They're now available in .NET 9 Preview 7:
var guid = Guid.CreateVersion7();
var guidWithTimestamp = Guid.CreateVersion7(DateTimeOffset.UtcNow);