allende2001

joined 7 months ago
[–] allende2001@lemmygrad.ml 0 points 2 hours ago* (last edited 2 hours ago) (1 children)

From HB news mega (post body):

spoiler

Image is an illustration that I have made to show what each side means when they say that Hormuz is “open” or “closed”, as various officials and analysts have created a lot of confusion with their statements, both intentionally and unintentionally.


I’m tentatively going back to the weekly thread format in the hopes that even if/when the conflict resumes, daily comment counts will keep us at or below ~3000 per week. If not, we’ll just go back to the 3000 comment threshold being what triggers a new thread being created.

The events of the last two weeks have been the most unintelligible of at least the last four years, and on some days I took one look at the situation and decided to just not even bother and do something else until the next day.

spoiler To attempt to summarize: Against many people’s expectations, including my own, the ceasefire was not immediately scuttled upon its inception despite violations (predominantly against Lebanon), which indicates to me that both the US and Iran wanted a ceasefire more than they wanted to continue firing, at least for two weeks. For both sides, it represented an opportunity to reorganize, rebuild, and restrategize going forward.

The US has continued its rapid flurry of airlifting to and from the Middle East, and while what exactly they have brought and intend to do next is a mystery, airlifting is a very inefficient method of transferring resources en masse, meaning that any kind of massive ground invasion is still many months away (though I still strongly doubt it’ll ever happen). Attempting to do more raids like the failed Istafan raid seems like the most likely option, as well as perhaps some disastrous attempts to hold Gulf islands.

Meanwhile, Iran has been excavating the entrances to their missile cities and has rapidly rebuilt bridges and railway lines. While the rate of reconstruction has shocked some observers, people like us who have paid abnormally high attention to the Ukraine War will not be surprised - infrastructure is very difficult to take out for any meaningful length of time even when it’s not purposefully decentralized. It also seems extremely likely that Iran has continued to receive shipments of resources and weapons from Russia and China, though what exactly is being supplied is not concretely known.

Iran sent a highly qualified team to Pakistan to negotiate, and the US sent, among others, Vice President Vance too. After a marathon ~20 hour session, no deal was struck, and both sides left Pakistan (the Iranian team taking many precautions to not get shot down). While the nuclear issue seemed to be the major sticking point, it is very difficult to see the US - and Trump in particular - formally agreeing to a tollbooth in Hormuz or the retreat from their Middle Eastern bases even if they have already effectively retreated from most of them.

These negotiations took place in an environment of constant violations of the ceasefire on the Lebanon front. Iran initially tied their attendance of talks to a total cessation of conflict in Lebanon, though ultimately decided to go to Islamabad without a de facto ceasefire but with some sort of guarantee that we’ll go tell Netanyahu to stop firing for a while. A few days after the negotiations failed, a more comprehensive ceasefire was actually achieved in Lebanon. It’s still a Zionist Ceasefire (“you cease fire, we keep attacking”), and the Zionists committed several massive civilian atrocities just before the ceasefire began. After the ceasefire began, violations have, to my knowledge, been remarkably few up to the time of me writing this.

Shortly after the failure of negotiations, the US began their own blockade of Iran’s ports. As the US Navy cannot get within a few hundred miles of even the entrance of the Strait of Hormuz, the blockade is taking place at some line in the Sea of Oman, where Iranian ships will be intercepted. The confusion caused by this situation has been incredible, with a few days of people tracking Iranian tankers closely, concluding that if they had crossed the Strait of Hormuz, they had successfully ran the blockade (they had not). After about a week of this de jure blockade, it was indeed confirmed to be real when the US captured its first Iranian oil tanker. This prompted Iran to fully close the Strait of Hormuz (see the megathread image), and there are reports of, as always, at best questionable veracity that in response to the US’s blockade of their blockade, Iran possibly intends to 1) totally blockade Gulf State ports in the Persian Gulf of any kind, not just oil, and/or 2) talk to their ally Ansarallah and have them blockade the Red Sea (and they seem keen to do so in support of the Resistance).

Additionally, Iran has made the end of the US blockade the precondition to enter into new negotiations. The short term and even medium term effect of the US blockade will be minimal - China has a colossal strategic petroleum reserve which will last them several months even with their economy at full steam even assuming all Middle Eastern imports are cut off overnight, and Iran itself is not wholly reliant on oil exports for basic survival like other oil states (though it’ll certainly hurt the economy if prolonged). There are also certain ways that the blockade can be subverted, like potentially some advanced shadow fleet tactics with the cooperation of allied countries, or, in the long term, the construction of overland oil transportation routes (a significant railway route was constructed in the last few years between Iran and China). :::

Source: https://lemmygrad.ml/post/11380097

[–] allende2001@lemmygrad.ml 4 points 1 day ago* (last edited 1 day ago)

Archive link: https://archive.ph/gDajY

Full text (from January 21st, 2026):

Spy Family

The Central Intelligence Agency (CIA) has been stepping up its efforts in the world of AI — including an eyebrow-raising use of chatbot tech.

As the New York Times reports, the CIA has been quietly developing a platform that lets analysts "talk" to foreign leaders, in a bid to predict how they might react in certain situations. The human variety of this type of behavior-predicting analysis has been the bread and butter of the agency's behind-the-scenes grunts for a very long time. Instead of painstakingly compiling "profiles" on world leaders based on public information and gathered intelligence, however, those analysts will engage in faux conversation with large language models (LLMs) trained on similar intelligence and information that's presumably being fed into its training data.

The NYT didn't say how formally the chatbot has been deployed, or who helped develop it. However, an interview with the CIA's first chief technology officer, ex-Pentagon AI czar Nand Mulchandani, reveals that its opacity is very much by design. Mulchadani, a Silicon Valley veteran, has a chart in his offices showing all the layers of approval it takes to get any private sector collaboration approved within the secretive agency. From handing issues with contracts to taking care of any project roadblocks, each step requires an incredible amount of bureaucracy and clandestine discussion — hurdles that the CIA acknowledges are hindering its quest to keep up with innovation and China, America's main tech adversary.

Training Day

The agency's now-CTO was, as the NYT notes, hired to help spearhead a forward-thinking sea change within the CIA. In the two-and-a-half years since he was brought on, Mulchadani has apparently made it easier for private companies to start working with the intelligence agency — and reading between the lines, it seems he's held the hands of tech CEOs through the labyrinthine bureaucracy.

"The more we share about how we employ technology, how we procure technology, what we’re going to do with it, will make companies want to work with us and want to team with us more," explained Juliane Gallina, the deputy director of the CIA's digital innovation arm, in an interview with the NYT.

According to Gallina, the agency is looking to declassify and "expose a little bit" of its secret technological sauce to help procure private sector contracts.

There was no mention, however, of whether the public will be given a look behind the curtain of what their tax dollars are helping to fund.

More on spies: Hackers Apparently Stole the FBI's Call Logs With Confidential Informants

 

Archive link: https://archive.ph/KDutA

Japan has unveiled a new name for days that reach 40C (104F) or above, after the country experienced its hottest summer on record last year. The term - kokushobi - has been translated as "cruelly hot", "brutally hot" or "severely hot" day by Japanese and international media. The name emerged as the most popular in a national online survey, with "super extremely hot day" in second place. Extreme weather events like heatwaves are becoming more common and more intense around the world, fuelled by human activities such as the burning of fossil fuels.


The description, introduced by Japan's Meteorological Agency (JMA) on Friday, uses koku - meaning harsh or cruel - to describe the heat, the Japan Times newspaper reported. The survey was conducted in February and March and received roughly 478,000 responses, in which people picked their preferred term among 13 options to describe the hottest day. Japan already has terms for days over 25C, 30C and 35C.


The new word for even hotter weather comes after record-shattering heat hit Japan last year. Summer 2025 was the hottest since records began in 1898 - with average temperatures nationwide 2.36C above average. Temperatures reached 40C-plus on nine days between June and August, with a new national peak of 41.8C in the city of Isesaki. The cumulative number of extremely hot days also surpassed the previous record set in 2024. For example, Tokyo recorded 25 days over 35C, compared with an average of just 4.5 days. Kyoto logged 52 days above the same temperature, compared with an average of 18.5 days. This summer, JMA forecasts a high probability of above-normal temperatures in Japan from June to August.

 

cross-posted from: https://lemmygrad.ml/post/11354418

Dubbed the "artificial sun," the Burning Plasma Experimental Superconducting Tokamak (BEST) is under construction in Hefei, east China's Anhui Province. The BEST facility represents one of China's major ventures into controlled nuclear fusion and is poised to attempt the world's first fusion energy power generation demonstration.


bonus article: https://english.cas.cn/newsroom/cas-in-media/202604/t20260417_1157472.shtml (Burning Plasma Experimental Superconducting Tokamak under Construction in Hefei, China's Anhui)

 

Dubbed the "artificial sun," the Burning Plasma Experimental Superconducting Tokamak (BEST) is under construction in Hefei, east China's Anhui Province. The BEST facility represents one of China's major ventures into controlled nuclear fusion and is poised to attempt the world's first fusion energy power generation demonstration.


bonus article: https://english.cas.cn/newsroom/cas-in-media/202604/t20260417_1157472.shtml (Burning Plasma Experimental Superconducting Tokamak under Construction in Hefei, China's Anhui)

 

cross-posted from: https://lemmygrad.ml/post/11354233

Archive link: https://archive.ph/MjhpZ (Links omitted)

We’ve been saying this for years now, and we’re going to keep saying it until the message finally sinks in: mandatory age verification creates massive, centralized honeypots of sensitive biometric data that will inevitably be breached. Every single time. And every single time it happens, the politicians who mandated these systems and the companies that built them act shocked—shocked!—that collecting enormous databases of government IDs, facial scans, and biometric data from millions of people turns out to be a security nightmare.

Well, here we go again. A couple weeks ago, Discord announced it would launch “teen-by-default” settings for its global audience, meaning all users would be shunted into a restricted experience unless they verified their age through biometric scanning. The internet, predictably, was not thrilled. But while many users were busy venting their frustration, a group of security researchers decided to do something more useful: they took a look under the hood at Persona, one of the companies Discord was using for verification (specifically for users in the UK).

What they found, according to The Rage, was exactly what we would predict:

Together with two other researchers, they set out to look into Persona, the San Francisco-based startup that’s used by Discord for biometric identity verification – and found a Persona frontend exposed to the open internet on a US government authorized server. In 2,456 publicly accessible files, the code revealed the extensive surveillance Persona software performs on its users, bundled in an interface that pairs facial recognition with financial reporting – and a parallel implementation that appears designed to serve federal agencies.

Let me say that again: 2,456 publicly accessible files sitting on a government-authorized server, exposed to the open internet. Files that revealed a system performing not a simple age check, but a ton of potentially intrusive checks:

Once a user verifies their identity with Persona, the software performs 269 distinct verification checks and scours the internet and government sources for potential matches, such as by matching your face to politically exposed persons (PEPs), and generating risk and similarity scores for each individual. IP addresses, browser fingerprints, device fingerprints, government ID numbers, phone numbers, names, faces, and even selfie backgrounds are analyzed and retained for up to three years. The information the software evaluates on the images themselves includes “Selfie Suspicious Entity Detection,” a “Selfie Age Inconsistency Comparison,” similar background detection, which appears to be matched to other users in the database, and a “Selfie Pose Repeated Detection,” which seems to be used to determine whether you are using the same pose as in previous pictures.

This was the same company checking whether a teenager should be allowed to use voice chat on a gaming platform.

Beyond offering simple services to estimate your age, Persona’s exposed code compares your selfie to watchlist photos using facial recognition, screens you against 14 categories of adverse media from mentions of terrorism to espionage, and tags reports with codenames from active intelligence programs consisting of public-private partnerships to combat online child exploitative material, cannabis trafficking, fentanyl trafficking, romance fraud, money laundering, and illegal wildlife trade.

So you wanted to verify you’re old enough to use voice chat, and now there’s a permanent risk score somewhere documenting whether you might be involved in illegal wildlife trafficking.

What could go wrong?

As the researchers put it to The Rage:

“The internet was supposed to be the great equalizer. Information wants to be free, the network interprets censorship as damage and routes around it, all that beautiful optimism. And for a minute it was true.”

[….]

“The state wants to see everything. The corporations want to see everything. And they’ve learned to work together.”

Discord, to its credit, has now said it will not be proceeding with Persona for identity verification. And to be fair, Discord and similar internet companies are in an impossible position here—facing mounting regulatory pressure in multiple jurisdictions to verify ages while being handed a market of vendors who keep turning out to be security nightmares. But this is part of a pattern that should be deeply familiar by now.

Just last year, Discord’s previous third-party age verification partner suffered a breach that exposed 70,000 government ID photos, which were then held for ransom. Discord said it stopped using that vendor. Then it moved to Persona, which was already raising concerns due to connections to Peter Thiel. Now Persona’s frontend is found wide open on a government-authorized server, and Discord is dropping them too.

See the pattern? Discord keeps swapping vendors like someone frantically rotating buckets under a leaking roof, apparently hoping the next bucket won’t have a hole in it. But the problem was never the bucket. The problem is the hole in the roof — the never-ending stream of age-verification government mandates.

And this brings us to the bigger, more important point that almost nobody in the “protect the children” policy crowd seems willing to engage with honestly. Every single time you mandate age verification, you are mandating the creation of a centralized database of extraordinarily sensitive personal information. Government IDs. Biometric facial data. The kind of data that, once breached, cannot be “changed” like a password. You get one face. You get one government ID number. When those leak—and they will leak—the damage is permanent.

Even the IEEE Spectrum Magazine is now publishing articles that detail how age verification undermines any effort to protect children by putting their privacy at risk.

These systems fail in predictable ways.

False positives are common. Platforms identify as minors adults with youthful faces, or adults who are sharing family devices, or have otherwise unusual usage. They lock accounts, sometimes for days. False negatives also persist. Teenagers learn quickly how to evade checks by borrowing IDs, cycling accounts, or using VPNs.

The appeal process itself creates new privacy risks. Platforms must store biometric data, ID images, and verification logs long enough to defend their decisions to regulators. So if an adult who is tired of submitting selfies to verify their age finally uploads an ID, the system must now secure that stored ID. Each retained record becomes a potential breach target.

Scale that experience across millions of users, and you bake the privacy risk into how platforms work.

We have been cataloging these breaches for years. In 2024, Australia greenlit an age verification pilot, and hours later a mandated verification database for bars was breached. That same year, another ID verification service was breached, exposing private info collected on behalf of Uber, TikTok, and more. Then came the Discord vendor breach last year. And now Persona.

This keeps happening because it has to keep happening. It’s the inevitable result of a system designed to aggregate the exact kind of data that attackers most want to steal. Computer scientists and privacy experts have been sounding this alarm for years. And what makes this even more galling is that these age verification systems don’t even accomplish what they claim to accomplish. Take Australia’s infamous ban on social media for under-16s, the poster child for this approach. It’s been a complete failure on its own terms: plenty of kids have already figured out ways around the ban, while those who can’t—particularly kids with disabilities who relied on social platforms for community—are being actively harmed by their exclusion. As the security researcher who helped discover the Persona leak, Celeste, told The Rage:

“Normies won’t be able to bypass these,” while less benevolent people “will always find ways to exploit your system.”

So we’ve built a system that fails to keep out the people it’s supposedly targeting, while successfully creating permanent biometric dossiers on millions of law-abiding users. Not great!

Meanwhile, what’s happening at the legislative level is perhaps even more cynical. Governments around the world are pushing harder and harder for mandatory age verification online. And as these mandates create a captive market worth billions of dollars, a whole ecosystem of venture-backed “identity-as-a-service” startups has sprung up to serve it. Persona, valued at $2 billion and backed by Peter Thiel’s investment network, is just one of many. These companies make grand promises about privacy-preserving verification, get contracts with major platforms, and then — whoops — leave 2,456 files exposed on a government server.

And, of course, these very firms are now lobbying for stricter age verification mandates. They’ve positioned themselves as protectors of children while actively working to expand the legal requirements that guarantee their revenue stream.

Lawmakers mandate an impossible task, VC-backed startups pop up to sell a “solution,” those startups then lobby for even stricter mandates to protect their market, and the cycle repeats. “Child safety” has simply become the marketing department for a rent-seeking surveillance industry.

As long as the law demands that these biometric gates exist, the “security” of the data they collect will always be a secondary concern to “compliance” with the mandate. Companies will keep rotating through vendors, each one promising that their system is the one that won’t leak, right up until it does. And the age verification industry will keep lobbying for stricter laws, because every new mandate is another guaranteed revenue stream.

The researchers who exposed Persona’s frontend hope their findings will serve as a wake-up call. Given the track record, it probably won’t be. Discord dropping Persona changes nothing—the next vendor will collect the same data, make the same promises, and eventually suffer the same breach. Because the problem was never which company holds your biometric data. The problem is that anyone is being forced to hand it over in the first place.

 

Archive link: https://archive.ph/MjhpZ (Links omitted)

We’ve been saying this for years now, and we’re going to keep saying it until the message finally sinks in: mandatory age verification creates massive, centralized honeypots of sensitive biometric data that will inevitably be breached. Every single time. And every single time it happens, the politicians who mandated these systems and the companies that built them act shocked—shocked!—that collecting enormous databases of government IDs, facial scans, and biometric data from millions of people turns out to be a security nightmare.

Well, here we go again. A couple weeks ago, Discord announced it would launch “teen-by-default” settings for its global audience, meaning all users would be shunted into a restricted experience unless they verified their age through biometric scanning. The internet, predictably, was not thrilled. But while many users were busy venting their frustration, a group of security researchers decided to do something more useful: they took a look under the hood at Persona, one of the companies Discord was using for verification (specifically for users in the UK).

What they found, according to The Rage, was exactly what we would predict:

Together with two other researchers, they set out to look into Persona, the San Francisco-based startup that’s used by Discord for biometric identity verification – and found a Persona frontend exposed to the open internet on a US government authorized server. In 2,456 publicly accessible files, the code revealed the extensive surveillance Persona software performs on its users, bundled in an interface that pairs facial recognition with financial reporting – and a parallel implementation that appears designed to serve federal agencies.

Let me say that again: 2,456 publicly accessible files sitting on a government-authorized server, exposed to the open internet. Files that revealed a system performing not a simple age check, but a ton of potentially intrusive checks:

Once a user verifies their identity with Persona, the software performs 269 distinct verification checks and scours the internet and government sources for potential matches, such as by matching your face to politically exposed persons (PEPs), and generating risk and similarity scores for each individual. IP addresses, browser fingerprints, device fingerprints, government ID numbers, phone numbers, names, faces, and even selfie backgrounds are analyzed and retained for up to three years. The information the software evaluates on the images themselves includes “Selfie Suspicious Entity Detection,” a “Selfie Age Inconsistency Comparison,” similar background detection, which appears to be matched to other users in the database, and a “Selfie Pose Repeated Detection,” which seems to be used to determine whether you are using the same pose as in previous pictures.

This was the same company checking whether a teenager should be allowed to use voice chat on a gaming platform.

Beyond offering simple services to estimate your age, Persona’s exposed code compares your selfie to watchlist photos using facial recognition, screens you against 14 categories of adverse media from mentions of terrorism to espionage, and tags reports with codenames from active intelligence programs consisting of public-private partnerships to combat online child exploitative material, cannabis trafficking, fentanyl trafficking, romance fraud, money laundering, and illegal wildlife trade.

So you wanted to verify you’re old enough to use voice chat, and now there’s a permanent risk score somewhere documenting whether you might be involved in illegal wildlife trafficking.

What could go wrong?

As the researchers put it to The Rage:

“The internet was supposed to be the great equalizer. Information wants to be free, the network interprets censorship as damage and routes around it, all that beautiful optimism. And for a minute it was true.”

[….]

“The state wants to see everything. The corporations want to see everything. And they’ve learned to work together.”

Discord, to its credit, has now said it will not be proceeding with Persona for identity verification. And to be fair, Discord and similar internet companies are in an impossible position here—facing mounting regulatory pressure in multiple jurisdictions to verify ages while being handed a market of vendors who keep turning out to be security nightmares. But this is part of a pattern that should be deeply familiar by now.

Just last year, Discord’s previous third-party age verification partner suffered a breach that exposed 70,000 government ID photos, which were then held for ransom. Discord said it stopped using that vendor. Then it moved to Persona, which was already raising concerns due to connections to Peter Thiel. Now Persona’s frontend is found wide open on a government-authorized server, and Discord is dropping them too.

See the pattern? Discord keeps swapping vendors like someone frantically rotating buckets under a leaking roof, apparently hoping the next bucket won’t have a hole in it. But the problem was never the bucket. The problem is the hole in the roof — the never-ending stream of age-verification government mandates.

And this brings us to the bigger, more important point that almost nobody in the “protect the children” policy crowd seems willing to engage with honestly. Every single time you mandate age verification, you are mandating the creation of a centralized database of extraordinarily sensitive personal information. Government IDs. Biometric facial data. The kind of data that, once breached, cannot be “changed” like a password. You get one face. You get one government ID number. When those leak—and they will leak—the damage is permanent.

Even the IEEE Spectrum Magazine is now publishing articles that detail how age verification undermines any effort to protect children by putting their privacy at risk.

These systems fail in predictable ways.

False positives are common. Platforms identify as minors adults with youthful faces, or adults who are sharing family devices, or have otherwise unusual usage. They lock accounts, sometimes for days. False negatives also persist. Teenagers learn quickly how to evade checks by borrowing IDs, cycling accounts, or using VPNs.

The appeal process itself creates new privacy risks. Platforms must store biometric data, ID images, and verification logs long enough to defend their decisions to regulators. So if an adult who is tired of submitting selfies to verify their age finally uploads an ID, the system must now secure that stored ID. Each retained record becomes a potential breach target.

Scale that experience across millions of users, and you bake the privacy risk into how platforms work.

We have been cataloging these breaches for years. In 2024, Australia greenlit an age verification pilot, and hours later a mandated verification database for bars was breached. That same year, another ID verification service was breached, exposing private info collected on behalf of Uber, TikTok, and more. Then came the Discord vendor breach last year. And now Persona.

This keeps happening because it has to keep happening. It’s the inevitable result of a system designed to aggregate the exact kind of data that attackers most want to steal. Computer scientists and privacy experts have been sounding this alarm for years. And what makes this even more galling is that these age verification systems don’t even accomplish what they claim to accomplish. Take Australia’s infamous ban on social media for under-16s, the poster child for this approach. It’s been a complete failure on its own terms: plenty of kids have already figured out ways around the ban, while those who can’t—particularly kids with disabilities who relied on social platforms for community—are being actively harmed by their exclusion. As the security researcher who helped discover the Persona leak, Celeste, told The Rage:

“Normies won’t be able to bypass these,” while less benevolent people “will always find ways to exploit your system.”

So we’ve built a system that fails to keep out the people it’s supposedly targeting, while successfully creating permanent biometric dossiers on millions of law-abiding users. Not great!

Meanwhile, what’s happening at the legislative level is perhaps even more cynical. Governments around the world are pushing harder and harder for mandatory age verification online. And as these mandates create a captive market worth billions of dollars, a whole ecosystem of venture-backed “identity-as-a-service” startups has sprung up to serve it. Persona, valued at $2 billion and backed by Peter Thiel’s investment network, is just one of many. These companies make grand promises about privacy-preserving verification, get contracts with major platforms, and then — whoops — leave 2,456 files exposed on a government server.

And, of course, these very firms are now lobbying for stricter age verification mandates. They’ve positioned themselves as protectors of children while actively working to expand the legal requirements that guarantee their revenue stream.

Lawmakers mandate an impossible task, VC-backed startups pop up to sell a “solution,” those startups then lobby for even stricter mandates to protect their market, and the cycle repeats. “Child safety” has simply become the marketing department for a rent-seeking surveillance industry.

As long as the law demands that these biometric gates exist, the “security” of the data they collect will always be a secondary concern to “compliance” with the mandate. Companies will keep rotating through vendors, each one promising that their system is the one that won’t leak, right up until it does. And the age verification industry will keep lobbying for stricter laws, because every new mandate is another guaranteed revenue stream.

The researchers who exposed Persona’s frontend hope their findings will serve as a wake-up call. Given the track record, it probably won’t be. Discord dropping Persona changes nothing—the next vendor will collect the same data, make the same promises, and eventually suffer the same breach. Because the problem was never which company holds your biometric data. The problem is that anyone is being forced to hand it over in the first place.

[–] allende2001@lemmygrad.ml 0 points 1 week ago

do-something Handala Hack, you have the opportunity to do something interesting

[–] allende2001@lemmygrad.ml 0 points 1 week ago (3 children)

Full text of reddit post:

I'll keep this short because I'm genuinely fuming.

I work in tech so I know companies hoard data. But this one hit different.

I know a doctor who mentioned to me that Palantir, the American surveillance company that worked with ICE and the NSA, now has access to "operational data" from our NHS. I thought.. that can't include patient records, right?

Turns out, under the Federated Data Platform contract, Palantir gets access to pseudonymised patient data across all of England. Read this: Medact - Briefing: Concerns Regarding Palantir Technologies and NHS Data Systems

That means my GP visits, my prescriptions, my hospital stays, all of it, flowing through their systems. There's no consent screen. No checkbox. No "opt out of sharing with a US defence contractor". Just a quiet government deal worth £330 million.

And here's the bit that made my blood boil: NYC's public hospitals just dropped Palantir because of activist pressure. NYC hospitals were sharing private health data with Palantir. And they still walked away.

But the UK? We're doubling down. Palantir now has over half a billion pounds in UK contracts... MoD, FCA, police forces, even bloody councils.

I tried to find out if I can request my data from Palantir. You can't. They're not a "healthcare provider" so GDPR gets weird. But they definitely have a digital shadow of me sitting on their servers.

How is this legal? And what happens when Palantir gets bought by someone worse, or when a hacker breaches their systems, or when the government decides "operational data" suddenly includes names and addresses?

Because "trust us" didn't work for Google, for Facebook, or for any of the other companies that promised not to be evil.

I'm genuinely considering a subject access request to my NHS trust just to see what they have on me

[–] allende2001@lemmygrad.ml 0 points 1 week ago* (last edited 1 week ago) (1 children)

From HB news mega (post body):

spoiler

Mere hours before Trump’s 8pm Tuesday deadline yesterday, Pakistan’s government contacted Iran with a US-written proposal for a two-week ceasefire, explicitly stated to also include Lebanon, during which they would negotiate a permanent end to the war on the basis of Iran’s 10 Points. Among other things, these points include 1) maintaining strict control (joint with Oman) over Hormuz, complete with a toll; 2) the end of sanctions on Iran; 3) keeping their enriched uranium; 4) a withdrawal of US forces from the Middle East [stated by the Supreme Leadership Council but not in the 10 Points, so who knows], and 5) some plausible guarantee that Iran would never be attacked again. I’ve heard rumors that China may have prodded Iran to accept these terms.

In theory, these are relatively confident and maximalist demands. In practice, Iran has already achieved military and economic control over Hormuz and the withdrawal of many US troops and bases from the region, so at least a few of Iran’s demands are, to a greater or lesser extent, already achieved, and with little hope for an increasingly exhausted US to undo these achievements short of nukes.

A couple hours after the ceasefire, the Zionist entity began a wave of airstrikes in Lebanon, killing hundreds of civilians, as well as flying drones into Iranian airspace. This was a strange move to make even if you assume - very sensibly - that the US is completely agreement non-capable: why not agree to the ceasefire and simply pretend to negotiate for two weeks while regrouping/repairing what assets you can and then start hitting Iran again?

One theory is that the Zionists are testing to what degree Iran is actually willing to have solidarity with Lebanon and Hezbollah. While the Resistance has been relatively united since October 7th, the formation of separate peaces instead of negotiating terms as a united front has been a major exploitable weakness. Alternatively, it’s been proposed that the US didn’t even consider using the ceasefire to regroup and deceive Iran, and that Trump merely wanted a way to chicken out of his threat on Iran’s electrical grid - the fact that US officials have since stated that Iran’s 10 Points were not the same ones they agreed to is a point supporting this, I suppose. If the conflict resumes and Trump does not deliver another 48 hour deadline (and/or makes it something silly like a month from now) then this could be the explanation.

From Iran, I am getting the sense that a lot is happening behind the scenes. Statements from top officials like Araghchi have stated quite plainly that there will be no ceasefire and no negotiations unless the Zionists stop attacking Lebanon, but as of ~24 hours after the ceasefire began, there has been no significant military response from Iran yet. There have apparently been phone calls between Araghchi and numerous regional officials, but it is unknown to what end. All the while, the global economic situation continues to deteriorate. Over the next week or two, the last tankers that left Hormuz before it closed will arrive at their destinations. If the missile exchanges begin once more, then the West, much like most of the rest of the world, will be experiencing all sorts of fuel, energy, food, and product shortages while trying to justify why they broke the ceasefire to kill more Lebanese civilians.

Source: https://lemmygrad.ml/post/11264976

1
Bootstraps: Edition (hexbear.net)
submitted 1 week ago* (last edited 1 week ago) by allende2001@lemmygrad.ml to c/slop@hexbear.net
 

very-intelligent We don't care. Just get an job ffs and pull yourself up by your bootstraps instead of fundraising for even the most basic essentials just so you and your family can survive an still-ongoing genocide being actively perpetuated and committed by the US empire and its vassals with full support

Source: https://lemmygrad.ml/post/11262991/8039729 (comment removed by mod)

Donate to @EhabAbeer99@hexbear.net and share EhabAbeer99's campaign to as many people as possible if you can!

[–] allende2001@lemmygrad.ml 1 points 1 week ago (1 children)

This is from April 2023.

[–] allende2001@lemmygrad.ml 0 points 1 week ago (1 children)

This is from April 2023.

[–] allende2001@lemmygrad.ml 0 points 2 weeks ago* (last edited 2 weeks ago)

Meanwhile in China...

Chinese doctors have successfully performed an intercontinental, ultra-long-distance remote liver cancer resection from France on an 80-year-old patient 10,000 kilometers away in east China's Hangzhou. The operation utilizing a homegrown remote surgery robot was completed in just 50 minutes

Source: https://xcancel.com/PDChina/status/1947552193273377020

 
1
submitted 2 weeks ago* (last edited 2 weeks ago) by allende2001@lemmygrad.ml to c/us_news@lemmygrad.ml
 

Archive link: https://archive.ph/T81fy

 

cross-posted from: https://lemmy.ml/post/45484446

First of all, I want to tell Israel and the Israeli leaders that if Israel uses a nuclear warhead against any other country, including Iran, it will be the demise of Israel

–Victor Gao

[–] allende2001@lemmygrad.ml 0 points 2 weeks ago (2 children)

#BREAKING

Spokesman of Iran's Khatam al-Anbiya Headquarters:

Nothing is hidden from our sight. ‌

All ICT companies in the region will be considered legitimate targets for us.

Source: https://x.com/TehranTimes79/status/2039946692020092977

Source (alternate): https://reddit.com/r/NVDA_Stock/comments/1sbtpl6/iran_just_threatened_to_blow_up_stargate/

[–] allende2001@lemmygrad.ml 0 points 2 weeks ago (2 children)

From: https://lemmygrad.ml/post/11227040/8019202

This appears to be a high quality article:

Scientists tried to quantify weakening ocean currents. They determined that the current is further north by 50km as confirmed by satillight imagry. A Model predicts that as the currents get weaker, it goes further north due to less tug from other southern currents. The model simulation gives slight movements in current (50 km at a time) across 400 years before a sudden jump far northward and 2 years before complete collapse. If it collapses then land climate in Europe will get far harsher (very hot to very cold in short period) which has agriculture and energy consumption impacts.

 
 

Archive link: https://archive.ph/lpv4c

view more: next ›