

Software
I want to believe: an application has been presented that will allow you to fix UFOs
Enigma Labs has unveiled a free Enigma application that will allow UFO hunters to collect data on various anomalies. In the program, you can create and edit notes, as well as structure them, take photos and record videos.
The algorithm looks like this:
- If the user saw a UFO, he can quickly take a picture of it.
- Then, in the Enigma application, you need to create a new note and add data there.
- In the note, you can specify the place and time of observation, the shape of the object, the duration of observation, and so on.
- You can also specify the type of device that recorded the UFO: smartphone, camera, telescope, or something else.
After that, the application will check if there are traces of processing on the images, and will also tell you how far the observer was from airfields, spaceports or other places where quite terrestrial aircraft can be located. After that, the record is assigned a level of reliability, and the most reliable messages are included in the general encyclopedia.
There are already more than 300,000 reports in the Enigma database, and the new application will increase coverage. The application itself is not yet available check in users.

Software
Elon Musk announced the availability of Twitter Blue around the world: what does a paid subscription give

Paid verification of accounts on the social network Twitter, which is given using a subscription called Twitter Blue, has become available to users around the world.
This was announced by the head of Twitter, American billionaire Elon Musk, who also heads Tesla, SpaceX, The Boring Company and Neuralink.
A Twitter Blue subscription allows users of the social network to receive a blue check mark in their accounts, which indicates the authenticity of their accounts. You can subscribe for a price of $ 7 per month, which was confirmed by Elon Musk himself.
Sign up today to get blue tick, conversation priority ranking, half ads, long tweets, bookmark folders, custom navigation, tweet editing, untweeting and more.
Software
Employees of Apple and Twitter are driven to the offices. You can get fired for working from home

Zoe Schiffer, who was recently managing editor of Twitter and now holds the same position at Platformer, said that Apple strictly monitors how employees visit offices.
Apple tracks employee attendance (using electronic badge records) and alerts employees if they don’t show up to the office at least 3 times a week.
Zoe Schiffer
Some at Apple, according to Schiffer, say that non-compliance could lead to dismissal, but she added that this does not seem like company policy.
In addition, she revealed that her former boss, Elon Musk, sent an email to Twitter employees at 2:30 a.m. stating that “office visits are no longer optional.” The billionaire noticed that the San Francisco office was half empty when he last visited.
Security
Scissors undercut: Windows 11 vulnerability reveals sensitive information from screenshots, including deleted parts

A dangerous vulnerability has been discovered in one of the standard Windows 11 applications that could lead to the disclosure of sensitive information to the user. Moreover, at the moment the vulnerability is not closed and attackers can use it.
We are talking about the application Snipping Tool (Scissors). The vulnerability, called aCropalypse, allows you to undo changes made by a user when editing a screenshot, including cropped or blurred parts that hide sensitive data.
When you edit a screenshot, you can save it with the same name as the original file by overwriting it. However, as it turns out, the Windows 11 Snipping Tool does not remove the original information from the file, but simply leaves it added at the end, which is usually invisible to users. With some trickery, a potential attacker can extract hidden information from a file and see what information has been edited.
As you can see, edited screenshots are usually much larger due to the inclusion of information from the original image.
This is a pretty serious vulnerability. For example, if you share a screenshot of an order confirmation page on Amazon, it may contain an address, the same goes for credit card numbers and other sensitive data.
-
News3 days ago
Nvidia CEO Jensen Huang wants to run the company for another 30-40 years, and then become a robot and continue to hold this post
-
News5 days ago
Nikon Z8 Full-Frame Mirrorless Camera Coming in April, May Be Cheaper Than Expected
-
Gaming6 days ago
Build in 60 seconds: That’s how long it took GPT-4 to generate a Pong game in JavaScript
-
News6 days ago
6000 mAh, 48 MP and big screen. Huawei Enjoy 60 battery monster launches March 23