Tea

joined 1 week ago
 

I have a side question here, does pirating this platform is legal?

I am asking because AI can not generate a IP or own a one in the US.

 

Most homebuyers get to know the people who live next door after they move in. But a new real estate app allows future homebuyers to learn a potential neighbor’s political leanings before they make what, for many people, is the biggest purchase of their life.

 

A renewed attempt to introduce site blocking in the U.S. emerged in late January when U.S. Rep. Zoe Lofgren (D) introduced the Foreign Anti-Digital Piracy Act. The FADPA bill received the MPA's full support, and it now transpires that similar legislation is being prepared by U.S. Rep. Darrell Issa (R). A recent meeting to discuss the 'American Copyright Protection Act' was attended by Disney, Paramount, and Amazon, plus Google, YouTube, and Verizon.

 

The Russian influence operations Doppelganger and Operation Undercut utilized several tactics to spread content on X, TikTok, 9gag, and Americas Best Pics and Videos

The Russian disinformation operations known as Doppelganger and Operation Undercut promoted content attacking Ukraine, Europe, and the United States using nine different languages and four platforms. On X, thousands of accounts were created to post pro-Kremlin content in addition to promoting redirect links to fake media websites. The network relied on trending hashtags and bot-like accounts to share the content to reach wider audiences. On TikTok, at least twenty-four accounts posted hundreds of videos that garnered millions of views, often relying on AI-generated narration and content masking to evade detection. Identical video content also appeared on online platforms 9gag and Americas Best Pics and Videos.

Operation Doppelganger is a Russian malign information operation known for impersonating reputable media outlets, targeting users with fake articles that promote Russia’s narratives. The DFRLab, other organizations, tech companies, and governments previously covered the operation’s multiple and ongoing iterations targeting various countries on different platforms since August 2022. Operation Undercut runs in parallel to Doppelganger, prompting similar narratives using AI-edited videos and images, along with screenshots from legitimate media outlets taken out of context to undermine Ukraine. The operation has been attributed to at least three Russian companies under sanctions, including the Social Design Agency, Structura and ANO “Dialog”, allegedly with support from cybercriminal syndicates like the AEZA group.

We collected data from X between December 12, 2024, to February 12, 2025, and observed Doppelganger activity primarily in French, German, Polish, English, and Hebrew. We also found some content in Turkish, Polish, Ukrainian, and Russian. We observed three main types of Doppelganger posts: posts with four captioned images, posts with one video or infographic, and posts with links that redirect to Doppelganger websites. As of February 21, 2025, 95 percent of accounts associated with the four captioned images posts and 73 percent of accounts associated with the single video/image posts in our sample had been suspended by X.

 

.

 

Flock Safety loves to crow about the thousands of local law enforcement agencies around the United States that have adopted its avian-themed automated license plate readers (ALPRs). But when a privacy activist launched a website to map out the exact locations of these pole-mounted devices, the company tried to clip his wings.

 

A first-of-its-kind policy allows Chinese firms to treat data as an asset, but compliance hurdles are keeping many companies on the sidelines.

  • The government has allowed all Chinese companies to register data as assets on their balance sheets.
  • Adoption of the policy has been slow, with only a small percentage of companies logging data as assets.
  • Compliance hurdles are high, but China’s experiment could potentially shape global accounting norms.
 

Malware targeting macOS systems is increasingly pervasive in our current threat landscape. Most of the associated threats are cybercrime-related, ranging from information stealers to cryptocurrency mining. Over the past year, we have witnessed an increase in cybercrime activity linked to North Korean nation-state APT groups.

In line with the public service announcement issued by the FBI regarding North Korean social engineering attacks, we have also witnessed several such social engineering attempts, targeting job-seeking software developers in the cryptocurrency sector.

In this campaign, we discovered a Rust-based macOS malware nicknamed RustDoor masquerading as a legitimate software update, as well as a previously undocumented macOS variant of a malware family known as Koi Stealer. During our investigation, we observed rare evasion techniques, namely, manipulating components of macOS to remain under the radar.

The characteristics of these attackers are similar to various reports during the past year of North Korean threat actors targeting other job seekers. We assess with a moderate level of confidence that this attack was carried out on behalf of the North Korean regime.

This article details the activity of attackers within compromised environments. It also provides a technical analysis of the newly discovered Koi Stealer macOS variant and depicts the different stages of the attack through the lens of Cortex XDR.

 

Inocencia en Juego: An Investigation into Groups Targeting Children on Facebook

I am a professor of Latin American history and Director of the Civic Resilience Initiative of the Institute for Cyber Law, Policy, and Security at the University of Pittsburgh. I am also a mother of four: my older children were born and raised in Costa Rica, where we lived for nearly a decade and I taught at the main public university. In my research, I study various phenomena related to social media. In 2022, I published an account of my failed efforts to get Facebook to remove public Spanish-language groups in which children were being openly targeted for online sexual exploitation in Wired.

Eventually, in the months after publication, those specific groups disappeared. However, in 2023, I stumbled into a new set of public groups permeated by the same type of content. These were framed as fan groups for the Mexico kid hip-hop trio Los Picus. I wrote an initial report on the phenomenon in Tech Policy Press last January.

In this update and extension of that work, I report that the scope of the problem is far greater than I had initially found, encompassing multiple different fandoms and many dozens of public Facebook groups with over two and a half million members. Groups that center around popular celebrities, such as YouTube stars Mau McMahon and Karla Bustillos and the child members of their household; Phoenix, Arizona-born teen entertainer Xavi; and K-Pop stars, become host to what appears to be child predation.

The groups I have identified likely represent just a fraction of the problem. In addition to my own research, over the past few months, five journalists in Spanish-language news organizations in Latin America, coordinated by the investigative journalism consortium El CLIP, looked into these phenomena. Today, they published their reports in El CLIP, Chequeado, Crónica Uno, El Espectador, and Factchequeado. Their reporting indicates that this problem extends to even further Facebook groups—many not associated with any fandom, but rather branded as places to discuss teen issues— that the legislation in the countries investigated is often insufficient to deal with this sort of digital grooming, and that Meta collaborates too little with local authorities to try to curb this behavior.

In this report, I use the fact that posters in these Facebook groups sometimes ask participants to post their age and country of origin to provide rough quantitative data on the regional spread of stated ages and national origin. Numerous accounts in these groups identify themselves as children from Mexico, Venezuela, Colombia, Peru, and Ecuador, with others from across the hemisphere. Accounts identifying as children as young as 7 and 8 are present, and 10, 11, and 12-year-olds are common.

Towards the end of this report, I look in detail at some of the interactions in comments within these—again, fully public—groups to describe some forms of emotional luring and manipulation that very young Spanish-speaking Facebook users are apparently subject to.

We presented a range of questions to Meta about these phenomena. A Meta spokesperson responded with a statement and provided a link to Meta’s proactive steps to address these and similar phenomena:

Child exploitation is a horrific crime. We work aggressively to fight it on and off our platforms and to support law enforcement in its efforts to arrest and prosecute the criminals behind it. Our policies prohibit child exploitation, inappropriate interactions with children, and the sexualization of minors; these rules apply globally, in different languages, including English and Spanish, and across each of our platforms. While predators constantly change their tactics to evade detection, our global teams and tools work to identify and quickly remove violating content.

Please note that the report below contains disturbing descriptions and screenshots of posts and interactions involving accounts identifying as children. These images have been edited to remove any information that could be used to identify a particular account or user identity.

 

Following the arrest of Telegram founder Pavel Durov in France last summer, some positive changes were reported. The criminal probe is not centered on piracy, but Telegram appeared more responsive. Some reported that the speed at which takedown requests were processed, went from more than 24 hours to less than 20 minutes, for example.

In addition, Telegram updated its terms of service and privacy policy to clarify that, going forward, personal details of alleged infringers, including their IP addresses, would be handed over in response to valid legal requests.

This stricter policy was evident to outsiders as well. Telegram removed accounts of piracy associated websites and services, after initially leaving these untouched for years. That included the official Z-Library channel, which had more than half a million subscribers at its peak.

Although Z-Library’s communication channel didn’t directly link to pirated books, it served as a key information hub, providing updates on new features and access methods. That was enough to warrant a permanent suspension last month.

The Telegram ban was a setback for Z-Library, but the shadow library wasted no time creating a new account and regaining tens of thousands of subscribers. Progress ground to a halt last weekend when the ‘new’ @zlibrary_news account was also suspended for copyright infringement.

“The channel is unavailable due to copyright infringement,” Telegram reports.

The channel is unavailable due to copyright infringement.

In addition to the main communication channel, one of the most used Z-Library download bots on Telegram was also taken offline. The @1lib account had more than 20,000 monthly users, who presumably used it as a handy tool to download books for free.

According to a Z-Library representative posting on X, Telegram took action in response to complaints from a major publisher. Many other ‘personal’ bots are unaffected and remain online for the time being.

view more: ‹ prev next ›