YubNub Social YubNub Social
    #humor #ai #artificialintelligence #automotiveengineering #qualityassurance
    Advanced Search
  • Login
  • Register

  • Night mode
  • © 2025 YubNub Social
    About • Directory • Contact Us • Developers • Privacy Policy • Terms of Use • shareasale • FB Webview Detected • Android • Apple iOS • Get Our App

    Select Language

  • English
Install our *FREE* WEB APP! (PWA)
Night mode toggle
Community
News Feed (Home) Popular Posts Events Blog Market Forum
Media
Go LIVE! Headline News VidWatch Game Zone Top PodCasts
Explore
Explore Offers
© 2025 YubNub Social
  • English
About • Directory • Contact Us • Developers • Privacy Policy • Terms of Use • shareasale • FB Webview Detected • Android • Apple iOS • Get Our App
Advertisement
Stop Seeing These Ads

Discover posts

Posts

Users

Pages

Group

Blog

Market

Events

Games

Forum

Science Explorer
Science Explorer
7 d

Mystery behind cold blob in the Atlantic Ocean finally solved
Favicon 
www.livescience.com

Mystery behind cold blob in the Atlantic Ocean finally solved

Scientists have determined that slowing ocean currents are responsible for a cold spot south of Greenland.
Like
Comment
Share
Nostalgia Machine
Nostalgia Machine
7 d

‘Everybody Loves Raymond’ Reboot Has Heartbreaking Update For Fans
Favicon 
doyouremember.com

‘Everybody Loves Raymond’ Reboot Has Heartbreaking Update For Fans

The beloved sitcom Everybody Loves Raymond remains a staple of American television, with its timeless humor and heartfelt family dynamics. Decades after its original run, fans continue to revisit the Barone family’s hilarious misadventures. Now, speculation about a possible Everybody Loves Raymond reboot has resurfaced, and both the cast and series creator have weighed in. While no official reboot is currently in the works, the topic is gaining traction. During a recent interview, showrunner Phil Rosenthal expressed openness to exploring a new version of the sitcom, perhaps through a spinoff or reunion-style episode. However, the absence of cast members like Doris Roberts and Peter Boyle, both of whom have passed away, remains a sensitive consideration. Everybody Loves Raymond Reboot Could Honor Original Cast – If It Happens Never gets old! S2E3 “Brother” #EverybodyLovesRaymond #RaymondQuotes pic.twitter.com/2SPB17zn0M — Everybody Loves Raymond (@Raymond_Quotes) September 4, 2016   Phil Rosenthal acknowledged that rebooting the series without key original cast members would be challenging. “The loss is too significant,” he said, reflecting on the irreplaceable roles of Frank and Marie Barone. Patricia Heaton also shared in past interviews that while she’s proud of the show’s legacy, reviving it would need the right approach to honor everyone involved. The beloved cast of Everybody Loves Raymond, whose hilarious and heartfelt stories made the sitcom a household favorite./YouTube Screenshot Ray Romano, who played the titular character, remains in close contact with the surviving cast. Any future reboot, he suggested, would have to capture the original series’ warmth and subtle wit. Fans of the show remember episodes like “Debra Makes Something Good” and “The Can Opener” not just for laughs, but for their emotional depth. The Legacy of Everybody Loves Raymond Continues The full cast of Everybody Loves Raymond in a classic group photo, capturing the close-knit family dynamic that made the sitcom a timeless favorite. Despite uncertainty around a formal reboot, the Everybody Loves Raymond legacy lives on through streaming platforms and cast appearances. The show’s impact on family sitcoms remains evident, influencing newer series while keeping its loyal audience. Reruns still draw strong ratings, and social media buzz proves fans are eager for more Barone family stories. Ray Romano and Patricia Heaton reunite at a special, immersive exhibit dedicated to the show./YouTube Screenshot Rosenthal remains active in television and food documentaries, while Heaton and Romano continue to act and produce. A potential Everybody Loves Raymond reboot could serve as a tribute to the show’s enduring appeal—and to the characters that made audiences laugh and feel deeply for nearly a decade. Next up: MTV Announces It Will Play Music Videos 24/7 Again — With A Twist The post ‘Everybody Loves Raymond’ Reboot Has Heartbreaking Update For Fans appeared first on DoYouRemember? - The Home of Nostalgia. Author, Ruth A
Like
Comment
Share
Science Explorer
Science Explorer
7 d

A Statistical Analysis of Exoplanet Habitability Turns Up One Great Candidate - And Significant Observational Bias
Favicon 
www.universetoday.com

A Statistical Analysis of Exoplanet Habitability Turns Up One Great Candidate - And Significant Observational Bias

The search for life beyond our planet continues, and one of the most underappreciated tools in an astrobiologists' toolkit is statistics. While it might not be as glamorous as directly imaging a planet’s atmosphere or finding a system with seven planets in it, statistics is absolutely critical if we want to be sure that what we’re seeing is real and not just an artifact of the data, or of our observational techniques themselves. A new paper by Caleb Traxler and their co-authors at the Department of Information and Computer Science at UC Irvine takes on that challenge head-on by statistically analyzing a set of about 10% of the total number of exoplanets found and judging their habitability.
Like
Comment
Share
Science Explorer
Science Explorer
7 d

The Galactic Center Isn't Spitting Out Stars. What Does This Mean?
Favicon 
www.universetoday.com

The Galactic Center Isn't Spitting Out Stars. What Does This Mean?

Sometimes a non-detection can tell you a lot. For example, astronomers recently searched through data containing around 5 million stars captured by the Dark Energy Spectroscopic Instrument. They were looking for stars that had been ejected from the center of the Milky Way galaxy, through the gravitational interaction of the supermassive black hole Sgr A*. They failed to find any obvious candidates, which suggests that Sgr A* hasn't merged with another black hole recently.
Like
Comment
Share
Classic Rock Lovers
Classic Rock Lovers  
7 d

Foreigner Admits They Are No Longer On a Farewell Tour
Favicon 
ultimateclassicrock.com

Foreigner Admits They Are No Longer On a Farewell Tour

The discovery of a new lead singer within their ranks has given the band fresh life, according to Jeff Pilson. Continue reading…
Like
Comment
Share
Classic Rock Lovers
Classic Rock Lovers  
7 d

13 Wallflowers Classic Rock Collaborations
Favicon 
ultimateclassicrock.com

13 Wallflowers Classic Rock Collaborations

*image When you are the offspring of a famous musician, your last name becomes both a burden and a curse. This is especially true if you decide to also be a musician. While having a famous parent can help you meet the right people, it can also prompt comparison after comparison... Continue reading…
Like
Comment
Share
DeepLinks from the EFF
DeepLinks from the EFF
7 d

How Cops Can Get Your Private Online Data
Favicon 
www.eff.org

How Cops Can Get Your Private Online Data

Can the cops get your online data? In short, yes. There are a variety of US federal and state laws which give law enforcement powers to obtain information that you provided to online services. But, there are steps you as a user and/or as a service provider can take to improve online privacy.Law enforcement demanding access to your private online data goes back to the beginning of the internet. In fact, one of  EFF’s first cases, Steve Jackson Games v. Secret Service, exemplified the now all-too-familiar story where unfounded claims about illegal behavior resulted in overbroad seizures of user messages. But it’s not the ’90s anymore, the internet has become an integral part of everyone’s life. Everyone now relies on organizations big and small to steward our data, from huge service providers like Google, Meta, or your ISP, to hobbyists hosting a blog or Mastodon server. There is no “cloud,” just someone else's computer—and when the cops come knocking on their door, these hosts need to be willing to stand up for privacy, and know how to do so to the fullest extent under the law. These legal limits are also important for users to know, not only to mitigate risks in their security plan when choosing where to share data, but to understand whether these hosts are going to bat for them. Taking action together, service hosts and users can curb law enforcement getting more data than they’re allowed, protecting not just themselves but targeted populations, present and future.This is distinct from law enforcement’s methods of collecting public data, such as the information now being collected on student visa applicants. Cops may use social media monitoring tools and sock puppet accounts to collect what you share publicly, or even within “private” communities. Police may also obtain the contents of communication in other ways that do not require court authorization, such as monitoring network traffic passively to catch metadata and possibly using advanced tools to partially reveal encrypted information. They can even outright buy information from online data brokers. Unfortunately there are few restrictions or oversight for these practices—something EFF is fighting to change.Below however is a general breakdown of the legal processes used by US law enforcement for accessing private data, and what categories of private data these processes can disclose. Because this is a generalized summary, it is neither exhaustive nor should be considered legal advice. Please seek legal help if you have specific data privacy and security needs.Type of dataProcess usedChallenge prior to disclosure?Proof neededSubscriber informationSubpoenaYesRelevant to an investigationNon-content information, metadataCourt order; sometimes subpoenaYesSpecific and articulable facts that info is relevant to an investigationStored contentSearch warrantNoProbable cause that info will provide evidence of a crimeContent in transitSuper warrantNoProbable cause plus exhaustion and minimizationTypes of Data that Can be CollectedThe laws protecting private data online generally follow a pattern: the more sensitive the personal data is, the greater factual and legal burden police have to meet before they can obtain it. Although this is not exhaustive, here are a few categories of data you may be sharing with services, and why police might want to obtain it.Subscriber Data: Information you provide in order to use the service. Think about ID or payment information, IP address location, email, phone number, and other information you provided when signing up. Law enforcement can learn who controls an anonymous account, and find other service providers to gather information from.Non-content data, or "metadata": This is saved information about your interactions on the service; like when you used the service, for how long, and with whom. Analogous to what a postal worker can infer from a sealed letter with addressing information.Law enforcement can use this information to infer a social graph, login history, and other information about a suspect’s behavior.Stored content: This is the actual content you are sending and receiving, like your direct message history or saved drafts. This can cover any private information your service provider can access. This most sensitive data is collected to reveal criminal evidence. Overly broad requests also allow for retroactive searches, information on other users, and can take information out of its original context. Content in transit: This is the content of your communications as it is being communicated. This real-time access may also collect info which isn’t typically stored by a provider, like your voice during a phone call.Law enforcement can compel providers to wiretap their own services for a particular user—which may also implicate the privacy of users they interact with.Legal Processes Used to Get Your DataWhen US law enforcement has identified a service that likely has this data, they have a few tools to legally compel that service to hand it over and prevent users from knowing information is being collected.SubpoenaSubpoenas are demands from a prosecutor, law enforcement, or a grand jury which do not require approval of a judge before being sent to a service. The only restriction is this demand be relevant to an investigation. Often the only time a court reviews a subpoena is when a service or user challenges it in court.Due to the lack of direct court oversight in most cases, subpoenas are prone to abuse and overreach. Providers should scrutinize such requests carefully with a lawyer and push back before disclosure, particularly when law enforcement tries to use subpoenas to obtain more private data, such as the contents of communications.Court OrderThis is a similar demand to subpoenas, but usually pertains to a specific statute which requires a court to authorize the demand. Under the Stored Communications Act, for example, a court can issue an order for non-content information if police provide specific facts that the information being sought is relevant to an investigation. Like subpoenas, providers can usually challenge court orders before disclosure and inform the user(s) of the request, subject to law enforcement obtaining a gag order (more on this below). Search WarrantA warrant is a demand issued by a judge to permit police to search specific places or persons. To obtain a warrant, police must submit an affidavit (a written statement made under oath) establishing that there is a fair probability (or “probable cause”) that evidence of a crime will be found at a particular place or on a particular person. Typically services cannot challenge a warrant before disclosure, as these requests are already approved by a magistrate. Sometimes police request that judges also enter gag orders against the target of the warrant that prevent hosts from informing the public or the user that the warrant exists.Super WarrantPolice seeking to intercept communications as they occur generally face the highest legal burden. Usually the affidavit needs to not only establish probable cause, but also make clear that other investigation methods are not viable (exhaustion) and that the collection avoids capturing irrelevant data (minimization). Some laws also require high-level approval within law enforcement, such as leadership, to approve the request. Some laws also limit the types of crimes that law enforcement may use wiretaps in while they are investigating. The laws may also require law enforcement to periodically report back to the court about the wiretap, including whether they are minimizing collection of non-relevant communications. Generally these demands cannot be challenged while wiretapping is occurring, and providers are prohibited from telling the targets about the wiretap. But some laws require disclosure to targets and those who were communicating with them after the wiretap has ended. Gag ordersMany of the legal authorities described above also permit law enforcement to simultaneously prohibit the service from telling the target of the legal process or the general public that the surveillance is occurring. These non-disclosure orders are prone to abuse and EFF has repeatedly fought them because they violate the First Amendment and prohibit public understanding about the breadth of law enforcement surveillance.How Services Can (and Should) Protect YouThis process isn't always clean-cut, and service providers must ultimately comply with lawful demands for user’s data, even when they challenge them and courts uphold the government’s demands. Service providers outside the US also aren’t totally in the clear, as they must often comply with US law enforcement demands. This is usually because they either have a legal presence in the US or because they can be compelled through mutual legal assistance treaties and other international legal mechanisms. However, services can do a lot by following a few best practices to defend user privacy, thus limiting the impact of these requests and in some cases make their service a less appealing door for the cops to knock on.Put Cops through the ProcessParamount is the service provider's willingness to stand up for their users. Carving out exceptions or volunteering information outside of the legal framework erodes everyone's right to privacy. Even in extenuating and urgent circumstances, the responsibility is not on you to decide what to share, but on the legal process. Smaller hosts, like those of decentralized services, might be intimidated by these requests, but consulting legal counsel will ensure requests are challenged when necessary. Organizations like EFF can sometimes provide legal help directly or connect service providers with alternative counsel.Challenge Bad RequestsIt’s not uncommon for law enforcement to overreach or make burdensome requests. Before offering information, services can push back on an improper demand informally, and then continue to do so in court. If the demand is overly broad, violates a user's First or Fourth Amendment rights, or has other legal defects, a court may rule that it is invalid and prevent disclosure of the user’s information.Even if a court doesn’t invalidate the legal demand entirely, pushing back informally or in court can limit how much personal information is disclosed and mitigate privacy impacts.Provide Notice Unless otherwise restricted, service providers should give notice about requests and disclosures as soon as they can. This notice is vital for users to seek legal support and prepare a defense.Be Clear With Users It is important for users to understand if a host is committed to pushing back on data requests to the full extent permitted by law. Privacy policies with fuzzy thresholds like "when deemed appropriate" or “when requested” make it ambiguous if a user’s right to privacy will be respected. The best practices for providers not only require clarity and a willingness to push back on law enforcement demands, but also a commitment to be transparent with the public about law enforcement’s demands. For example, with regular transparency reports breaking down the countries and states making these data requests.Social media services should also consider clear guidelines for finding and removing sock puppet accounts operated by law enforcement on the platform, as these serve as a backdoor to government surveillance.Minimize Data Collection You can't be compelled to disclose data you don’t have. If you collect lots of user data, law enforcement will eventually come demanding it. Operating a service typically requires some collection of user data, even if it’s just login information. But the problem is when information starts to be collected beyond what is strictly necessary. This excess collection can be seen as convenient or useful for running the service, or often as potentially valuable like behavioral tracking used for advertising. However, the more that’s collected, the more the service becomes a target for both legal demands and illegal data breaches. For data that enables desirable features for the user, design choices can make privacy the default and give users additional (preferably opt-in) sharing choices. Shorter RetentionAs another minimization strategy, hosts should regularly and automatically delete information when it is no longer necessary. For example, deleting logs of user activity can limit the scope of law enforcement’s retrospective surveillance—maybe limiting a court order to the last 30 days instead of the lifetime of the account. Again design choices, like giving users the ability to send disappearing messages and deleting them from the server once they’re downloaded, can also further limit the impact of future data requests. Furthermore, these design choices should have privacy-preserving defaultAvoid Data Sharing Depending on the service being hosted there may be some need to rely on another service to make everything work for users. Third-party login or ad services are common examples with some amount of tracking built in. Information shared with these third-parties should also be minimized and avoided, as they may not have a strict commitment to user privacy. Most notoriously, data brokers who sell advertisement data can provide another legal work-around for law enforcement by letting them simply buy collected data across many apps. This extends to decisions about what information is made public by default, thus accessible to many third parties, and if that is clear to users.(True) End-to-End EncryptionNow that HTTPS is actually everywhere, most traffic between a service and a user can be easily secured—for free. This limits what onlookers can collect on users of the service, since messages between the two are in a secure “envelope.” However, this doesn’t change the fact the service is opening this envelope before passing it along to other users, or returning it to the same user. With each opened message, this is more information to defend.Better, is end-to-end encryption (e2ee), which just means providing users with secure envelopes that even the service provider cannot open. This is how a featureful messaging app like Signal can respond to requests with only three pieces of information: the account identifier (phone number), the date of creation, and the last date of access. Many services should follow suit and limit access through encryption.Note that while e2ee has become a popular marketing term, it is simply inaccurate for describing any encryption use designed to be broken or circumvented. Implementing “encryption backdoors” to break encryption when desired, or simply collecting information before or after the envelope is sealed on a user’s device (“client-side scanning”) is antithetical to encryption. Finally, note that e2ee does not protect against law enforcement obtaining the contents of communications should they gain access to any device used in the conversation, or if message history is stored on the server unencrypted.Protecting Yourself and Your CommunityAs outlined, often the security of your personal data depends on the service providers you choose to use. But as a user you do still have some options. EFF’s Surveillance Self-Defense is a maintained resource with many detailed steps you can take. In short, you need to assess your risks, limit the services you use to those you can trust (as much as you can), improve settings, and when all else fails, accessorize with tools that prevent data sharing in the first place—like EFF’s Privacy Badger browser extension.Remember that privacy is a team sport. It’s not enough to make these changes as an individual, it’s just as important to share and educate others, as well as fighting for better digital privacy policy on all levels of governance. Learn, get organized, and take action. 
Like
Comment
Share
Intel Uncensored
Intel Uncensored
7 d News & Oppinion

rumbleRumble
NYC Real Estate Shares TANK, Grocery Chain THREATENS TO LEAVE NYC After Socialist WINS Dem Primary
Like
Comment
Share
Trending Tech
Trending Tech
7 d

People use AI for companionship much less than we’re led to think
Favicon 
techcrunch.com

People use AI for companionship much less than we’re led to think

A report by Anthropic reveals that people rarely seek companionship from AI, and turn to AI for emotional support or advice only 2.9% of the time.
Like
Comment
Share
Trending Tech
Trending Tech
7 d

Jeff Bezos is reportedly courting Trump after public spat with Musk
Favicon 
techcrunch.com

Jeff Bezos is reportedly courting Trump after public spat with Musk

Bezos allegedly sees an opening for his space company, Blue Origin, now that Musk has been diminished in the eyes of the President.
Like
Comment
Share
Showing 975 out of 84228
  • 971
  • 972
  • 973
  • 974
  • 975
  • 976
  • 977
  • 978
  • 979
  • 980
  • 981
  • 982
  • 983
  • 984
  • 985
  • 986
  • 987
  • 988
  • 989
  • 990
Stop Seeing These Ads

Edit Offer

Add tier








Select an image
Delete your tier
Are you sure you want to delete this tier?

Reviews

In order to sell your content and posts, start by creating a few packages. Monetization

Pay By Wallet

Payment Alert

You are about to purchase the items, do you want to proceed?

Request a Refund