Weekly Tech Wrap-Up 7-29-2023, a week in which Linux improving ethernet standards, accessing the dark web, Apple’s new anti-fingerprinting rules, and how the Pixel Fold improves all Android devices captivated our readers the most. Today, we look back at this week’s ten most engaging articles from the Tech Help Knowledgebase social media feeds. We order the summaries below by user engagement — the stories our users interacted with the most. Articles are in descending order, with the most engaging story first. Our human-curated social media feeds include links to technology news, how-to and help articles, and video tutorials for common issues.
Stories curated for our feeds are from our staff writers or culled from third-party sources that produce content related to the categories covered by our site. See the summaries and links below for this week’s top stories by user engagement. Follow us on Twitter, Facebook, Instagram, and YouTube to interact with our feeds.
Top 10 Most Engaging Stories This Week
The Linux Foundation has announced the formation of the Ultra Ethernet Consortium (UEC), a group of tech companies that aim to improve ethernet standards. The UEC includes Meta, Microsoft, Intel, Broadcom, and Arm, among others. The group’s goals include developing new ethernet standards that will support faster speeds and lower latency, as well as making ethernet more energy efficient. The UEC is still in its early stages, but it has the potential to make significant improvements to ethernet technology.
Hackernoon discusses how to access the dark web, a part of the internet not indexed by search engines and one requiring special software to gain access. The article explains what the dark web is and why people use it. Different ways to access the dark web exist, including using the Tor browser, the I2P network, and the Freenet project. The article also provides some tips for staying safe while using the dark web, such as using a VPN and being careful about what information you share.
Apple is cracking down on device fingerprinting, a technique that apps use to track users across different apps and websites. Starting with iOS 17, tvOS 17, watchOS 10, and macOS Sonoma, developers must explain why they use so-called required reason APIs. Apps face rejection if they fail to provide a valid reason. Device fingerprinting works by collecting data points about a device, such as its IP address, device model, and browser fingerprint. Collected data creates a unique identifier for the device, which could track a user’s activity across different apps and websites. Apple’s decision to crack down on device fingerprinting is a major win for privacy advocates. Device fingerprinting is a powerful tool for tracking users and building detailed profiles of their online activity. By restricting device fingerprinting, Apple is making it more difficult for apps to track users without their consent.
The Google Pixel Fold is a smartphone with a screen that folds in half. While the folding screen is impressive, it is not the most significant innovation of the device. The true brilliance of Google’s Pixel Fold philosophy is unrelated to the form itself. It lies in the software enhancements Google made to make the most of the expanded environment. Google dramatically rethought its approach to multitasking on Android. It introduced new interface elements and dug up long-existing software features to make them more prominent.
In Linux, you can run multiple commands at once by combining them on a single line using the semicolon (;) operator. The semicolon operator tells the shell to run each command sequentially, one after the other. If the first command fails, the remaining commands will not run. You can also use the && and || operators to control the order to run commands. The && operator tells the shell to run the second command only if the first command succeeds. The || operator tells the shell to run the second command only if the first command fails.
A new Mac malware called Realst steals cryptocurrency wallets. The malware impacts Windows and macOS users disguised as fake blockchain games. The malicious software adopts deceptive names like Brawl Earth, WildWorld, Dawnland, Destruction, Evolion, Pearl, Olymp of Reptiles, and SaintLegend. Realst is a sophisticated malware that can evade detection by many antivirus programs. It also steals cryptocurrency wallets from both desktop and mobile devices. To protect yourself from Realst, keep your operating system and software up to date. You should also be cautious when downloading software or files, especially if promoted through unsolicited messages or emails. Installing reputable antivirus and anti-malware software is also advisable.
Windows 11 offers several features to improve productivity. These include focus sessions, typing with your voice, using Teams via the taskbar, PowerToys, virtual desktops, Snap layouts, and the secret Start menu.
Google has proposed a new API called Web Environment Integrity (WEI) that allows websites to verify that no one tampers with a user’s browser. WEI would help to prevent piracy and other malicious activity. However, some browser makers, such as Vivaldi and Mozilla, are concerned that WEI could be used to block users from accessing websites unless they are using a specific browser. This could stifle competition and innovation in the browser market. The two companies have called on Google to reconsider the proposal and to prevent giving websites too much power. They have also suggested that Google work with the browser community to develop a more open and transparent solution.
Google Drive is a secure cloud storage service. It encrypts your files in transit and storage, and Google has a good security track record. However, there are some potential risks to consider, such as the fact that Google has access to your data and could potentially hand it over to law enforcement.
Apple has released iOS 16.6, which includes important security fixes for your iPhone. With automatic updates enabled, your iPhone will install the update in the background. However, if you want to be more proactive, you can manually install the update now. The iOS 16.6 update fixes some security vulnerabilities, including one that could allow an attacker to remotely execute code on your iPhone. The update also includes some bug fixes and performance improvements.
Thank you for visiting Tech Help Knowledgebase to read the Weekly Tech Wrap-Up 7-29-2023, a summary of this week’s ten most engaging stories. If you liked this article, follow us on Twitter @techhelpkb and subscribe to our YouTube channel to keep in the loop.
Henry Irvine, Contributing Technology Writer, translates more than a decade of internet technology experience in product and customer relationship management into practical help and how-to content. Look for him on Bay Area trails, music venues, or sausage shacks when he’s not writing. Don’t call him Hank if you see him. Seriously. Hank on Twitter