this post was submitted on 29 Apr 2025
546 points (98.4% liked)

Technology

69449 readers
4080 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 
  • In December, an investigation by Tom's Hardware found that Recall frequently captured sensitive information in its screenshots, including credit card numbers and Social Security numbers — even though its "filter sensitive information" setting was supposed to prevent that from happening.
you are viewing a single comment's thread
view the rest of the comments
[–] Retro_unlimited@lemmy.world 2 points 13 hours ago* (last edited 13 hours ago) (1 children)

I agree completely that open source can be audited by anyone, but I did read something tried to be sneaked into an update, and you never really know, software is complicated and maybe some roundabout way to have an exploit using code that looks like it’s intent was something different.

[–] Moose@moose.best 3 points 11 hours ago

Ah yes, I think that was when a FOSS maintainer had to step down and handed it off to someone else if I remember right? See this XKCD for relevance. It's pretty ridiculous how much we (and companies with billion dollar revenues) rely on the free work of others for such important systems. But yes, an important distinction to make is that certain Linux distributions may use code by others that is not open source and malicious without them realizing.