Snopes.com ([syndicated profile] snopes_feed) wrote2025-04-23 11:00 am

Photo of Salvadoran prison doesn't show detention center where Trump admin deported alleged gang mem

Posted by Nur Ibrahim

The photo circulated as purported evidence of the Trump administration's 2025 effort to deport alleged gang members to a prison in El Salvador.
How-To Geek ([syndicated profile] howtogeek_feed) wrote2025-04-23 10:37 am

Ford Hits the Brakes Again With Major New Recall

Posted by Adam Gray

Ford has announced three fresh recalls through the National Highway Traffic Safety Administration (NHTSA). The move affects various popular models, including the F-150, Expedition, and Lincoln Navigator.

Snopes.com ([syndicated profile] snopes_feed) wrote2025-04-23 10:00 am

No, Mike and Tony Beets from 'Gold Rush' were not sentenced to life in prison

Posted by Aleksandra Wrona

In April 2025, multiple YouTube videos spread the rumor that the father-and-son reality stars "were sentenced to life imprisonment."
How-To Geek ([syndicated profile] howtogeek_feed) wrote2025-04-23 10:00 am

HyperX Pulsefire Saga Pro Review: The Most Personalized Mouse I've Ever Used

Posted by Patrick Campanale

The HyperX Pulsefire Saga Pro is a pretty run-of-the-mill gaming mouse when it comes to specs, but that's not what makes it special. With a wide range of 3D printable files, this mouse can be customized like none I've ever used before, and I absolutely love that.

How-To Geek ([syndicated profile] howtogeek_feed) wrote2025-04-23 09:00 am

Today's NYT Connections Hints and Answer for April 23rd (#682)

Posted by Nick Lewis

Connections is a game from the New York Times that challenges you to find the association between words. It sounds easy, but it isn't—Connections categories can be almost anything, and they're usually quite specific. If you need a hand getting the answers, we've got you covered.

Deeplinks ([syndicated profile] eff_feed) wrote2025-04-23 08:48 am

Digital Identities and the Future of Age Verification in Europe

Posted by ARRAY(0x55775c5c0880)

This is the first part of a three-part series about age verification in the European Union. In this blog post, we give an overview of the political debate around age verification and explore the age verification proposal introduced by the European Commission, based on digital identities. Part two takes a closer look at the European Commission’s age verification app, and part three explores measures to keep all users safe that do not require age checks. 

As governments across the world pass laws to “keep children safe online,” more times than not, notions of safety rest on the ability of platforms, websites, and online entities being able to discern users by age. This legislative trend has also arrived in the European Union, where online child safety is becoming one of the issues that will define European tech policy for years to come. 

Like many policymakers elsewhere, European regulators are increasingly focused on a range of online harms they believe are associated with online platforms, such as compulsive design and the effects of social media consumption on children’s and teenagers’ mental health. Many of these concerns lack robust scientific evidence; studies have drawn a far more complex and nuanced picture about how social media and young people’s mental health interact. Still, calls for mandatory age verification have become as ubiquitous as they have become trendy. Heads of state in France and Denmark have recently called for banning under 15 year olds from social media Europe-wide, while Germany, Greece and Spain are working on their own age verification pilots. 

EFF has been fighting age verification mandates because they undermine the free expression rights of adults and young people alike, create new barriers to internet access, and put at risk all internet users’ privacy, anonymity, and security. We do not think that requiring service providers to verify users’ age is the right approach to protecting people online. 

Policy makers frame age verification as a necessary tool to prevent children from accessing content deemed unsuitable, to be able to design online services appropriate for children and teenagers, and to enable minors to participate online in age appropriate ways. Rarely is it acknowledged that age verification undermines the privacy and free expression rights of all users, routinely blocks access to resources that can be life saving, and undermines the development of media literacy. Rare, too, are critical conversations about the specific rights of young users: The UN Convention on the Rights of the Child clearly expresses that minors have rights to freedom of expression and access to information online, as well as the right to privacy. These rights are reflected in the European Charter of Fundamental Rights, which establishes the rights to privacy, data protection and free expression for all European citizens, including children. These rights would be steamrolled by age verification requirements. And rarer still are policy discussions of ways to improve these rights for young people.

Implicitly Mandatory Age Verification

Currently, there is no legal obligation to verify users’ age in the EU. However, different European legal acts that recently entered into force or are being discussed implicitly require providers to know users’ ages or suggest age assessments as a measure to mitigate risks for minors online. At EFF, we consider these proposals akin to mandates because there is often no alternative method to comply except to introduce age verification. 

Under the General Data Protection Regulation (GDPR), in practice, providers will often need to implement some form of age verification or age assurance (depending on the type of service and risks involved): Article 8 stipulates that the processing of personal data of children under the age of 16 requires parental consent. Thus, service providers are implicitly required to make reasonable efforts to assess users’ ages – although the law doesn’t specify what “reasonable efforts” entails. 

Another example is the child safety article (Article 28) of the Digital Services Act (DSA), the EU’s recently adopted new legal framework for online platforms. It requires online platforms to take appropriate and proportionate measures to ensure a high level of safety, privacy and security of minors on their services. The article also prohibits targeting minors with personalized ads. The DSA acknowledges that there is an inherent tension between ensuring a minor’s privacy, and taking measures to protect minors specifically, but it's presently unclear which measures providers must take to comply with these obligations. Recital 71 of the DSA states that service providers should not be incentivized to collect the age of their users, and Article 28(3) makes a point of not requiring service providers to collect and process additional data to assess whether a user is underage. The European Commission is currently working on guidelines for the implementation of Article 28 and may come up with criteria for what they believe would be effective and privacy-preserving age verification. 

The DSA does explicitly name age verification as one measure the largest platforms – so called Very Large Online Platforms (VLOPs) that have more than 45 million monthly users in the EU – can choose to mitigate systemic risks related to their services. Those risks, while poorly defined, include negative impacts on the protection of minors and users’ physical and mental wellbeing. While this is also not an explicit obligation, the European Commission seems to expect adult content platforms to adopt age verification to comply with their risk mitigation obligations under the DSA. 

Adding another layer of complexity, age verification is a major element of the dangerous European Commission proposal to fight child sexual abuse material through mandatory scanning of private and encrypted communication. While the negotiations of this bill have largely stalled, the Commission’s original proposal puts an obligation on app stores and interpersonal communication services (think messaging apps or email) to implement age verification. While the European Parliament has followed the advice of civil society organizations and experts and has rejected the notion of mandatory age verification in its position on the proposal, the Council, the institution representing member states, is still considering mandatory age verification. 

Digital Identities and Age Verification 

Leaving aside the various policy work streams that implicitly or explicitly consider whether age verification should be introduced across the EU, the European Commission seems to have decided on the how: Digital identities.

In 2024, the EU adopted the updated version of the so-called eIDAS Regulation, which sets out a legal framework for digital identities and authentication in Europe. Member States are now working on national identity wallets, with the goal of rolling out digital identities across the EU by 2026.

Despite the imminent roll out of digital identities in 2026, which could facilitate age verification, the European Commission clearly felt pressure to act sooner than that. That’s why, in the fall of 2024, the Commission published a tender for a “mini-ID wallet”, offering four million euros in exchange for the development of an “age verification solution” by the second quarter of 2025 to appease Member States anxious to introduce age verification today. 

Favoring digital identities for age verification follows an overarching trend to push obligations to conduct age assessments continuously further down in the stack – from apps to app stores to operating service providers. Dealing with age verification at the app store, device, or operating system level is also a demand long made by providers of social media and dating apps seeking to avoid liability for insufficient age verification. Embedding age verification at the device level will make it more ubiquitous and harder to avoid. This is a dangerous direction; digital identity systems raise serious concerns about privacy and equity.

This approach will likely also lead to mission creep: While the Commission limits its tender to age verification for 18+ services (specifically adult content websites), it is made abundantly clear that once available, age verification could be extended to “allow age-appropriate access whatever the age-restriction (13 or over, 16 or over, 65 or over, under 18 etc)”. Extending age verification is even more likely when digital identity wallets don’t come in the shape of an app, but are baked into operating systems. 

In the next post of this series, we will be taking a closer look at the age verification app the European Commission has been working on.

Snopes.com ([syndicated profile] snopes_feed) wrote2025-04-23 01:30 am

Breaking down claim that US has secret $150T 'trust fund'

Posted by Taija PerryCook

Financial commentator Jim Rickards claimed a law from 1872 indicated trillions in untouched mineral wealth.
Deeplinks ([syndicated profile] eff_feed) wrote2025-04-22 10:34 pm

Florida’s Anti-Encryption Bill Is a Wrecking Ball to Privacy. There's Still Time to Stop It.

Posted by Rindala Alajaji

We've seen plenty of bad tech bills in recent years, often cloaked in vague language about "online safety." But Florida’s SB 868 doesn’t even pretend to be subtle: the state wants a backdoor into encrypted platforms if minors use them, and for law enforcement to have easy access to your messages.

This bill should set off serious alarm bells for anyone who cares about digital rights, secure communication, or simply the ability to message someone privately without the government listening. Florida lawmakers aren’t just chipping away at digital privacy—they're aiming a wrecking ball straight at it.

TAKE ACTION

SB 868 is a blatant attack on encrypted communication. Since we last wrote about the bill, the situation has gotten worse. The bill and its House companion have both sailed through their committees and are headed to a full vote. That means, if passed, SB 868 would:

  • Force social media platforms to decrypt teens’ private messages, breaking end-to-end encryption
  • Ban “disappearing” messages, a common privacy feature that helps users—especially teens—control their digital footprint
  • Allow unrestricted parental access to private messages, overriding Florida’s own two-party consent laws for surveillance
  • Likely pressure platforms to remove encryption for all minors, which also puts everyone they talk to at risk

In short: if your kid loses their right to encrypted communication, so does everyone they talk to. 

There Is No Safe Backdoor

If this all sounds impossible to do safely, that’s because it is. There’s no way to create a “just for law enforcement” access point into encrypted messages. Every backdoor is a vulnerability. It's only a matter of time before someone else—whether a hacker, abuser, or foreign government—finds it. Massive breaches like Salt Typhoon have already proven that surveillance tools don’t stay in the right hands for long. Encryption either protects everyone—or it protects no one. We must protect it.

Encryption Matters—Especially for Teens

Encryption isn’t optional in today’s internet—it’s essential. It protects your banking info, your health data, your personal chats, and yes, your kids' safety online. 

SB 868 pretends to “protect children,” but does the opposite. Teens often need encrypted messaging to talk to trusted adults, friends, and family—sometimes in high-stakes situations like abuse, mental health crises, or discrimination. Stripping away those safeguards makes them more vulnerable, not less.

Investigators already have powerful tools to pursue serious crimes, including the ability to access device-level data and rely on user reports. In fact, studies show user reporting is more effective at catching online abuse than mass surveillance. So why push a bill that makes everyone less safe, weakens encryption, and invites lawsuits? That’s a question we all deserve an answer to.

It’s Time to Speak Up

Florida’s SB 868 isn’t just a bad bill—it’s a dangerous blueprint for mass surveillance. Tell Florida Legislators: SB 868 is unsafe, unworkable, and unacceptable.

If you live in Florida, contact your lawmakers and demand they reject this attack on encryption

TAKE ACTION

If you're outside the state, you can still speak out—public pressure matters, and the more people who call out how egregious this bill is, the harder it becomes for lawmakers to quietly push it forward. Make sure you follow us on social media to track the bills’ progress and help amplify the message.

Privacy is worth fighting for. Let’s stop SB 868 before it becomes law.

Snopes.com ([syndicated profile] snopes_feed) wrote2025-04-22 11:21 pm

What to know about reports RFK Jr. is launching registry to track Americans with autism

Posted by Grace Deng

NIH already keeps a list of registries for various diagnoses, but the "autism registry" report comes amid Kennedy's false assertions about autism.
How-To Geek ([syndicated profile] howtogeek_feed) wrote2025-04-22 10:11 pm

Gmail Will Help You Manage All Your Email Newsletters & Spam

Posted by Arol Wright

I have a huge problem with my Gmail account. It's filled to the brim with email subscriptions, some of which I subscribed to several years back—and going one-by-one unsubscribing to each is an extremely time-consuming task. Now, Gmail might actually help me fix that problem.

Snopes.com ([syndicated profile] snopes_feed) wrote2025-04-22 10:33 pm

Trump really showed kids 'assassination trading card' at White House Easter event

Posted by Nur Ibrahim

The card showed a photograph of the president after he was shot in the ear during a July 2024 rally in Butler, Pennsylvania.
Snopes.com ([syndicated profile] snopes_feed) wrote2025-04-22 09:41 pm

Yes, Marjorie Taylor Greene posted 'Evil is being defeated by the hand of God' on morning Pope Franc

Posted by Taija PerryCook

Greene grew up Catholic but left when she had children, saying she couldn't trust the Church leadership "to protect my children from pedophiles."
Deeplinks ([syndicated profile] eff_feed) wrote2025-04-18 05:55 pm

Six Years of Dangerous Misconceptions Targeting Ola Bini and Digital Rights in Ecuador

Posted by Veridiana Alimonti

Ola Bini was first detained in Quito’s airport six years ago, called a “Russian hacker,” and accused of “alleged participation in the crime of assault on the integrity of computer systems.” It wouldn't take long for Ecuadorean authorities to find out that he was Swedish and an internationally respected free software developer and computer expert. 

Lacking evidence, authorities rapidly changed the criminal offense underpinning the accusation against Bini and struggled to build a case based on a mere image that shows no wrongdoing. Yet, Bini remained arbitrarily detained for 70 days in 2019 and outrageously remains under criminal prosecution.

This week, the Observation Mission monitoring Ola Bini’s case is again calling out the prosecution’s inaccuracies and abuses that weaponize misunderstandings about computer security, undermining both Bini’s rights and digital security more broadly. The Observation Mission is comprised of digital and human rights organizations, including EFF. Specifically, we highlight how Ecuadorean law enforcement authorities have tried to associate the use of Tor, a crucial privacy protection tool, with inherently suspicious activity. 

Following a RightsCon 2025 session about the flaws and risks of such an interpretation, we are releasing this week a technical statement (see below) pointing out why Ecuadorean courts must reaffirm Bini’s innocence and repudiate misconceptions about technology and technical knowledge that only disguise the prosecutor’s lack of evidence supporting the accusations against Bini. 

Let’s not forget that Bini was unanimously acquitted in early 2023. Nonetheless, the Prosecutor’s Office appealed and the majority of the appeals court considered him guilty of attempted unauthorized access of a telecommunications system. The reasoning leading to this conclusion has many problems, including mixing the concepts of private and public IP addresses and disregarding key elements of the acquittal sentence.  

The ruling also refers to the use of Tor. Among other issues, the prosecution argued that Tor is not a tool known by any person except for technical experts since its purpose is to hide your identity on the internet while leaving no trace you're using it. As we stressed at RightsCon, this argument turns the use of a privacy-protective, security-enhancing technology into an indication of suspicious criminal activity, which is a dangerous extrapolation of the “nothing-to-hide argument.” 

The prosecutor’s logic, which the majority appeal ruling endorses, is if you’re keeping your online activities private it’s because you’re most likely doing something wrong, instead of we all have privacy rights, so we are entitled to use technologies that ensure privacy and security by default. 

Backing such an understanding in a court ruling sets an extremely worrying precedent for privacy and security online. The use of Tor must not be up for grabs when a prosecutor lacks actual evidence to sustain a criminal case.

Bini’s defense has appealed the unfounded conviction. We remain vigilant, hoping that the Ecuadorean judicial system will correct the course as per basic tenets of the right to a fair trial, recognizing the weakness of the case rather than surrendering to pressure and prejudice. It's past time for justice to prevail in this case. Six years of a lingering flimsy prosecution coupled with the undue restriction of Bini’s fundamental rights is already far too long.

Read the English translation of the statement below (see here the original one in Spanish):

TECHNICAL STATEMENT
Ola Bini’s innocence must be reaffirmed 

In the context of RightsCon Taipei 2025, the Observation Mission of the Ola Bini case and the Tor Project organized a virtual session to analyze the legal proceedings against the digital security expert in Ecuador and to discuss to what extent and with what implications the use of the Tor digital tool is criminalized1. In that session, which included organizations and speakers from civil society from different countries, we reached the following conclusions and technical consensuses: 

  1. The criminal case against Bini was initiated by political motivations and actors and has been marked by dozens of irregularities and illegalities that undermine its legal legitimacy and technical viability. Rather than a criminal case, this is a persecution. 
  2. The way the elements of conviction of the case were established sets a dangerous precedent for the protection of digital rights and expert knowledge in the digital realm in Ecuador and the region. 
  3. The construction of the case and the elements presented as evidence by the Ecuadorian Attorney General’s Office (EAG) are riddled with serious procedural distortions and/or significant technical errors2. 
  4. Furthermore, to substantiate the crime supposedly under investigation, the EAG has not even required a digital forensic examination that demonstrate whether any kind of system (be it computer, telematic, or telecommunications) was accessed without authorization. 
  5. The reasoning used by the Appeals Court to justify its guilty verdict lacks sufficient elements to prove that Ola Bini committed the alleged crime. This not only violates the rights of the digital expert but also creates precedents of arbitrariness that are dangerous for the rule of law3. 
  6. More specifically, because of the conviction, part of the Ecuadorian judiciary is creating a concerning precedent for the exercise of the rights to online security and privacy, by holding that the mere use of the Tor tool is sufficient indication of the commission of a criminal act. 
  7. Furthermore, contrary to the global trend that should prevail, this ruling could even inspire courts to criminalize the use of other digital tools used for the defense of human rights online, such as VPNs, which are particularly useful for key actors—like journalists, human rights defenders, academics, and others—in authoritarian political contexts. 
  8. Around the world, millions of people, including state security agencies, use Tor to carry out their activities. In this context, although the use of Tor is not the central focus of analysis in the present case, the current conviction—part of a politically motivated process lacking technical grounding—constitutes a judicial interpretation that could negatively impact the exercise of the aforementioned rights. 

For these reasons, and six years after the beginning of Ola Bini’s criminal case, the undersigned civil society organizations call on the relevant Ecuadorian judicial authorities to reaffirm Bini’s presumption of innocence at the appropriate procedural stage, as was the first instance ruling demonstrated.

The Observation Mission will continue monitoring the development of the case until its conclusion, to ensure compliance with due process guarantees and to raise awareness of the case’s implications for the protection of digital rights.

1. RightsCon is the leading global summit on human rights in the digital age, organized by Access Now. 

2. See https://www.accessnow.org/wp-content/uploads/2022/05/Informe-final-Caso-Ola-Bini.pdf 

3. The Tribunal is composed of Maritza Romero, Fabián Fabara and Narcisa Pacheco. The majority decision is from Fabara and Pacheco. 

How-To Geek ([syndicated profile] howtogeek_feed) wrote2025-04-22 09:32 pm

Samsung's Glasses-Free 3D Gaming Monitors Are Now Available

Posted by Jorge A. Aguilar

Samsung has released its 2025 Odyssey lineup of gaming monitors. The collection comes with the Odyssey 3D, Odyssey OLED G8, and the wide-screen Odyssey G9. They're pretty pricey, but Samsung is offering $300 Samsung credit for purchasing any new Odyssey monitor until April 27.

How-To Geek ([syndicated profile] howtogeek_feed) wrote2025-04-22 09:00 pm

What Is Starlink and How Do the Satellites Work?

Posted by Nick Lewis

Building out fiber optic network over thousands of miles to provide internet to millions of people is a difficult, time-consuming, and expensive task. What if you could cut out the physical connections entirely and only use wireless? That is exactly what Starlink aims to do.

How-To Geek ([syndicated profile] howtogeek_feed) wrote2025-04-22 08:56 pm

Max Will Now Charge for "Extra Members" Like Netflix

Posted by Joe Fedewa

Sharing your Max account with someone outside of your household? You're not alone, and Max has a new way to handle it that looks awfully familiar. Just like Netflix, Max is now letting you add an "Extra Member" to your account, but it'll cost you.

How-To Geek ([syndicated profile] howtogeek_feed) wrote2025-04-22 08:45 pm

Retro Handheld Company Suspends U.S. Shipping Over Controversial Tariffs

Posted by Marc Griffin

President Donald Trump's tariffs continue to cause mayhem upon the gaming industry, disrupting the global economy in the process. As a result, various gaming companies have cranked up their prices, pushed back pre-orders, and even increased how much subscription services would cost players—we're looking at you, Nintendo, and Sony. But they're not the only companies that have responded to Trump's tariffs.

How-To Geek ([syndicated profile] howtogeek_feed) wrote2025-04-22 08:36 pm

Google Fi Has a New $35/mo 5G Plan and Data-only eSIMs

Posted by Corbin Davenport

The mobile carrier Google Fi is now 10 years old, and Google is celebrating with a new unlimited plan for $35 per month, eSIMs for data-only devices, and helpful updates to its other plans.

Snopes.com ([syndicated profile] snopes_feed) wrote2025-04-22 08:34 pm
How-To Geek ([syndicated profile] howtogeek_feed) wrote2025-04-22 08:04 pm

For $20, Anker’s Waterproof Bluetooth Speaker Is an Easy Buy

Posted by Cory Gunther

Whether you're shopping for Mother's Day or looking for a new portable Bluetooth speaker for warmer weather, my favorite mini speaker is at its lowest price yet. I'm talking about the Soundcore Select 4 Go, which is 41% off for a limited time.