Vue lecture

La Moon Ball rejoint la collection premium des Poké Balls répliques

La collection de répliques de Poké Balls en métal proposée par The Wand Company s’agrandit. La première pièce de la nouvelle série annoncée par The Pokémon Company fait enfin son entrée officielle : la Moon Ball. Disponible dès maintenant sur le Pokémon Center, ce modèle emblématique issu des jeux vidéo Pokémon Or et Argent fait ... Lire plus

L'article La Moon Ball rejoint la collection premium des Poké Balls répliques est apparu en premier sur Fredzone.
  •  

Firefox 141 critiqué pour la consommation excessive des suggestions par IA - Next

Pour désactiver les fonctions d'IA dans FF :

about:config
browser.ml.chat.enabled -> false
browser.tabs.groups.smart.enabled -> false
browser.ml.enable -> false

(via plein de shaarli différents)

Edit : plus complet
browser.ml.chat.enabled = false
browser.ml.chat.shortcuts = false
browser.ml.chat.shortcuts.custom = false
browser.ml.chat.sidebar = false
browser.ml.enable = false
extensions.ml.enabled = false

browser.tabs.groups.smart.enabled = false
browser.tabs.groups.smart.optin = false
browser.tabs.groups.smart.userEnabled = false
(Permalink)
  •  

Covert Web-to-App Tracking via Localhost on Android

We disclose a novel tracking method by Meta and Yandex potentially affecting billions of Android users. We found that native Android apps—including Facebook, Instagram, and several Yandex apps including Maps and Browser—silently listen on fixed local ports for tracking purposes.
These native Android apps receive browsers' metadata, cookies and commands from the Meta Pixel and Yandex Metrica scripts embedded on thousands of web sites. These JavaScripts load on users' mobile browsers and silently connect with native apps running on the same device through localhost sockets. As native apps access programatically device identifiers like the Android Advertising ID (AAID) or handle user identities as in the case of Meta apps, this method effectively allows these organizations to link mobile browsing sessions and web cookies to user identities, hence de-anonymizing users' visiting sites embedding their scripts.
This web-to-app ID sharing method bypasses typical privacy protections such as clearing cookies, Incognito Mode and Android's permission controls. Worse, it opens the door for potentially malicious apps eavesdropping on users’ web activity.


Permalink
  •