#Microsoft API
Explore tagged Tumblr posts
blogs4rustysilver · 2 years ago
Text
0 notes
poutine-burger · 1 year ago
Text
I know this might be a long shot, but can anyone give me other games/media that uses the Microsoft Speech API 4.0 voice that KinitoPet uses? The voice reminds me of something and I cannot for the life of me remember what it is, although I do know it isnt BonziBuddy
3 notes · View notes
hats-off-solutions · 1 month ago
Text
Unlocking the Power of Microsoft 365 with Microsoft Graph API
In today’s cloud-driven world, businesses rely heavily on productivity tools like Microsoft 365. From Outlook and OneDrive to Teams and SharePoint, these services generate and manage a vast amount of data. But how do developers tap into this ecosystem to build intelligent, integrated solutions? Enter Microsoft Graph API — Microsoft’s unified API endpoint that enables you to access data across its suite of services.
What is Microsoft Graph API?
Tumblr media
Microsoft Graph API is a RESTful web API that allows developers to interact with the data of millions of users in Microsoft 365. Whether it’s retrieving calendar events, accessing user profiles, sending emails, or managing documents in OneDrive, Graph API provides a single endpoint to connect it all.
Tumblr media
Azure Active Directory
Outlook (Mail, Calendar, Contacts)
Teams
SharePoint
OneDrive
Excel
Planner
To Do
This unified approach simplifies authentication, query syntax, and data access across services.
Key Features
Single Authentication Flow: Using Microsoft Identity Platform, you can authenticate once and gain access to all services under Microsoft Graph.
Deep Integration with Microsoft 365: You can build apps that deeply integrate with the Office ecosystem — for example, a chatbot that reads Teams messages or a dashboard displaying user analytics.
Webhooks & Real-Time Data: Graph API supports webhooks, enabling apps to subscribe to changes in real time (e.g., receive notifications when a new file is uploaded to OneDrive).
Rich Data Access: Gain insights with advanced queries using OData protocol, including filtering, searching, and ordering data.
Extensible Schema: Microsoft Graph lets you extend directory schema for custom applications.
Common Use Cases
Tumblr media
Custom Dashboards: Display user metrics like email traffic, document sharing activity, or meetings analytics.
Workplace Automation: Create workflows triggered by calendar events or file uploads.
Team Collaboration Apps: Enhance Microsoft Teams with bots or tabs that use Graph API to fetch user or channel data.
Security & Compliance: Monitor user sign-ins, audit logs, or suspicious activity.
Authentication & Permissions
To use Graph API, your application must be registered in Azure Active Directory. After registration, you can request scopes like User Read, Mail Read, or Files ReadWrite. Microsoft enforces strict permission models to ensure data privacy and control.
Getting Started
Register your app in Azure Portal.
Choose appropriate Microsoft Graph permissions.
Obtain OAuth 2.0 access token.
Call Graph API endpoints using HTTP or SDKs (available for .NET, JavaScript, Python, and more).
Learn More About Our Microsoft Graph API
Microsoft Graph API is a powerful tool that connects you to the heart of Microsoft 365. Whether you’re building enterprise dashboards, automation scripts, or intelligent assistants, Graph API opens the door to endless possibilities. With just a few lines of code, you can tap into the workflows of millions and bring innovation right into the productivity stack.
0 notes
webtualglobal · 2 months ago
Text
Microsoft Copilot Studio is poised to revolutionize low-code development by providing a more user-friendly and effective means of creating unique applications. This new tool, integrated within Microsoft 365, allows organizations to create powerful applications with minimal coding effort, making it easier for teams to streamline workflows and enhance productivity. The blog explores how Microsoft Copilot Studio is shaping the future of low-code development and how businesses can leverage its capabilities.
The blog begins by explaining the role of low-code development in simplifying app creation. Traditionally, developing custom applications required specialized coding knowledge, but low-code platforms like Copilot Studio allow users to create apps through a visual interface, using pre-built templates and drag-and-drop features. This lowers the barrier to entry for non-developers and accelerates the development process for experienced programmers. Microsoft Copilot Studio enhances the power of Microsoft 365 apps, giving businesses the tools they need to design and deploy custom solutions without extensive programming.
Next, the blog delves into how Microsoft Copilot Studio integrates with Microsoft 365. The tool is designed to work seamlessly within the Microsoft ecosystem, making it a natural choice for businesses already using Microsoft Office 365. By leveraging Copilot Studio, organizations can easily create apps that interact with other Microsoft 365 apps, such as Teams, SharePoint, and Outlook, offering a unified solution for managing tasks, automating workflows, and improving collaboration across teams.
The blog also highlights the role of Microsoft 365 consulting and Microsoft 365 migration in maximizing the potential of Copilot Studio. Businesses looking to integrate Copilot Studio into their existing workflows can benefit from the expertise of Microsoft 365 consultants. These consultants can assist with the migration process, ensuring a smooth transition from legacy systems to the Microsoft ecosystem while setting up the right tools for effective app development.
By leveraging the power of Microsoft 365 apps and the capabilities of Copilot Studio, businesses can build customized applications that meet their unique needs. The blog concludes by emphasizing the value of working with Microsoft 365 consultants to ensure businesses make the most of the tools available, improving overall efficiency and performance.
In summary, Microsoft Copilot Studio is changing how businesses develop custom apps, making the process faster, easier, and more accessible. With the right Microsoft 365 consulting and support, organizations can Attachment the full potential of this tool to drive productivity and streamline operations
0 notes
freddynossa · 2 months ago
Text
Sistemas de Recomendación y Visión por Computadora: Las IAs que Transforman Nuestra Experiencia Digital
Sistemas de Recomendación: ¿Qué son y para qué sirven? Los sistemas de recomendación son tecnologías basadas en inteligencia artificial diseñadas para predecir y sugerir elementos (productos, contenidos, servicios) que podrían interesar a un usuario específico. Estos sistemas analizan patrones de comportamiento, preferencias pasadas y similitudes entre usuarios para ofrecer recomendaciones…
0 notes
munaeem · 4 months ago
Text
Who’s Spying on You the Most? Microsoft, Google, Nvidia, or Steam? Let’s Find Out!
Hey everyone! Let’s talk about something we all know but don’t always think about: tech companies spying on us. Yeah, it’s no secret that our devices and apps are constantly collecting data, but have you ever wondered who’s doing it the most? Is it Microsoft? Google? Nvidia? Steam? Or maybe even EA? I decided to run a little experiment to find out, and the results were… eye-opening. The…
0 notes
techenthuinsights · 4 months ago
Text
0 notes
pier-carlo-universe · 5 months ago
Text
Lavorare con i Servizi Internet: Tecnologie, Sicurezza e Opportunità. Come i servizi web, le tecnologie cloud e l’e-commerce stanno trasformando il nostro modo di vivere e lavorare
Nell’era digitale, i servizi Internet sono diventati una parte essenziale della nostra vita quotidiana, trasformando settori come l’istruzione, l’economia e la comunicazione
Nell’era digitale, i servizi Internet sono diventati una parte essenziale della nostra vita quotidiana, trasformando settori come l’istruzione, l’economia e la comunicazione. Questo articolo, elaborato da Umarov Bekzod Azizovich, docente presso il Dipartimento di Matematica Applicata e Informatica dell’Università Statale di Fergana, e da Mukhsinova Sevinchhon Ikromjon, studente del 3° anno,…
0 notes
diagnozabam · 8 months ago
Text
Microsoft Învinuiește UE pentru Ecranul Albastru al Morții cauzat de Bug-ul Antivirus CrowdStrike
Potrivit unui purtător de cuvânt al Microsoft, legislația Uniunii Europene (UE) a jucat un rol semnificativ în cea mai mare defecțiune IT din istoria modernă, care a blocat milioane de PC-uri Windows cu infamul ecran albastru al morții (BSOD). Aceasta a apărut după o actualizare defectuoasă a software-ului antivirus furnizat de partenerul CrowdStrike. Într-un interviu pentru The Wall Street…
0 notes
govindhtech · 1 year ago
Text
Admire HP and Poly Studio G62 Video Conferencing System
Tumblr media
In today’s hybrid world, being able to connect, communicate, and create with colleagues around the world is not just convenient it’s essential. Poly Studio G62 modular video conferencing system. Thus, it should come as no surprise that room endpoints, which include PC-based room kits, are expected to increase at a substantial rate by 2028 up to 20% Compound Annual Growth Rate, or CAGR according to Frost & Sullivan.
HP unveiled its next-generation Poly video conferencing and collaboration solutions today in response to this need, promising to provide more intelligent, adaptable, and engaging meeting experiences.
Sensible Options for Modular Areas
Co-engineered by HP’s desktop compute and collaboration teams, the Poly Studio Base Kit G9 Plus is a next-generation room solution for Microsoft Teams Rooms. The solution combines HP’s optimal compute performance with Poly’s illustrious collaboration experience. It consists of the new HP Mini IP PC G9 and Poly TC10 controller, which connects directly to the PC via a straightforward Power over Ethernet (PoE) connection. For more adaptability, more controllers can be added in bigger spaces. To suit the requirements of the meeting space, just combine the base kit with appropriate Poly cameras and other
Poly Studio V52
The greatest meeting experiences eliminate distracting background noise and enable participants to be seen and heard, even from a distance. To utilise Poly’s AI-driven audio and video features like Poly DirectorAI Perimeter, NoiseBlockAI, and Sound Reflection Reduction to reduce distractions and frame-up participants, a few Poly devices, like the Poly Studio V52 video bar, can be connected to the HP Mini IP PC. Your team meetings will become more productive with these kinds of collaborative AI advancements, enabling you to conduct your best meetings consistently.
Get moved
With a razor-sharp 4K 20MP camera, 5X zoom, and exceptional sound and audio pickup, you can meet like you’re in the same room.
Create a more effective dialogue
The most recent AI smart technology makes sure that everyone is constantly in focus, in frame, and engaged in the conversation without interruptions.
Ready for any kind of gathering, elevated conferencing
You can collaborate more effectively and consistently in any Poly-enabled environment thanks to flexible USB connectivity.
Poly Studio G62
With the Poly Studio G62, big and flexible venues can now have enterprise-grade audio and video conferencing capabilities. The system is modular. The Poly Studio G62 is the perfect option for board rooms, classrooms, and flexible spaces because of its modular architecture, which allows it to easily integrate with a variety of peripherals like cameras, microphones, and controllers.
Even in the largest meeting venues, the Poly Studio G62 offers a high-end experience that is easily expandable with additional cameras and microphones to guarantee attendees show up and stand out. The Poly Studio G62 is composed of 20% recycled metal and 80% post-consumer recycled plastic, all with an emphasis on sustainability. It also has versatile mounting choices to fit any place, making setup a breeze. Microsoft Teams certification for Poly Studio G62 has been obtained; certification for Zoom and Tencent are still waiting.Image Credit to HP
Growing has never been so simple
Make every big conference room work for you. By connecting your Poly controllers and peripherals to the Poly Studio G62 video conferencing system, you may use a modular solution that offers simplified versatility to change spaces.
An unparalleled conference experience
With the Poly Studio G62 video conferencing system, you may set up your perfect large room. Add more A/V devices to your setup as you see fit, without worrying about processing power, and create a richer, more immersive experience.
Simple to set up
Put complicated installations aside. Installing the magnetic mounts and PoE+ technology is simple and worry-free. Additionally, you may use the Poly TC10 in the room and effortlessly operate some third-party control systems with strong APIs.
Superior Handling with Poly VideoOS
You can utilise the Poly TC8 or TC10 as an advanced room controller with the next release of Poly VideoOS 4.3 software. Users may simply access video calls and control multiple room settings, including lighting and displays, from a single device when coupled with a Poly Studio X Series video bar, Poly Studio G62, or G7500 video conferencing system. More freedom is provided by this web-based feature, which lets users customise controls for a better in-room experience.
Entire Software Administration and Understanding
Poly Lens facilitates remote device management of Poly devices from a single dashboard for IT organisations. It supports the Poly Studio G62 and Poly Studio Base Kit G9 Plus. Furthermore, Poly Lens and Zoom Device Management (ZDM) have integrated to provide comprehensive room health status reports, enhancing productivity, insights, and troubleshooting for native Zoom Rooms that are accessed via the Poly Lens site.
Poly Lens
User interface for Poly Lens linked device status on laptop and mobile phone screens
Software called Poly Lens
Give end users authority over their personal devices, scalable management, and cognitive insights to empower IT.
Poly Lens Administration Cloud
IT teams have visibility and control over Poly devices thanks to Poly Lens software. Using a single scalable platform, deploy, configure, update, and extract important information from one or thousands of endpoints.
Poly Lens App
To stay focused and motivated throughout the day, utilise a handy app to update software, adjust device settings, and employ wellbeing reminders.
Cost and Availability
In June 2024, the Poly Studio Base Kit G9 Plus, intended for Microsoft Teams Rooms, will go on sale for $2,699.
In June 2024, the Poly Studio G62 modular video conferencing system will go on sale for $1,999.
June 2024 is when Poly VideoOS 4.3 is anticipated to be released.
Zoom Device Management now has support for Poly Lenses.
Read more on govindhtech.com
1 note · View note
virtualrealitynewstoday · 1 year ago
Text
Microsoft與Meta合作推出Windows Volumetric Apps API:開啟3D空間互動新時代
微軟宣布推出一項名為Windows Volumetric Apps的新API,這是一種“將 Windows 應用程式擴展到 3D 空間”的方法。 微軟與Meta的合作進入新階段,雙方致力於使Windows在Quest裝置上提供一流的體驗。利用Quest的獨特功能,Windows應用將能夠延伸至3D空間,為用戶創造出更加沉浸與互動的使用環境。 這一新API將作為Windows應用的擴展存在,當應用透過即將推出的微軟專為Quest設計的Windows應用進行流式傳輸時,用戶可以在Meta Quest頭戴顯示器的虛擬顯示器上,訪問位於本地網絡的實體PC或Windows 365 Cloud PC。 開發人員今天可以註冊開發人員預覽版,以獲得對「volumetric API」的存取權。 在Meta Connect…
Tumblr media
View On WordPress
0 notes
infydeva · 2 years ago
Text
[General Availability] Microsoft Graph Rich Notifications
Microsoft Graph allows apps to subscribe to and receive change notifications for resources through different delivery channels. You can set up subscriptions to include the changed resource data (such as the content of a Microsoft Teams chat message or Microsoft Teams presence information) in change notifications. Change notifications that include the resource change data are called Rich…
Tumblr media
View On WordPress
0 notes
concettolabs · 2 years ago
Text
0 notes
ilucky986 · 2 years ago
Text
#OpenAI #SamAltman #Microsoft #SatyaNadella #微軟 #紫微斗數 #命理
前幾天的新聞”微軟「養大」的 OpenAI 想反咬微軟一口”;這個新聞引起我的興趣。之前在鴻海董事長郭台銘拜訪OpenAI CEO Sam Altman時我曾經推論過Sam Altman的出生時間,排出他的紫微斗數命盤。對於2023年虛歲39歲的OpenAI Sam Altman來說,這個大限是他人生最好的大限。而45-54歲時則會是他人生最壞的大限。
https://blog.udn.com/mobile/ilucky986/179088386
而從2014年後微軟CEO 是出生在印度海德拉巴的印度裔薩蒂亞·納德拉(Satya Nadella),而不是幾年前我就解說過命盤的比爾蓋茨。
對開發者來說,微軟和Open AI,一是API供應商,一是雲端伺服器。中小企業開發者開發產品要寫程式需購買託管產品程式碼的雲端伺服器。如果產品涉及某特定功能,又需向API供應商付費購買調用功能API接口。有時雲端伺服器提供商也會搭售API,但通常兩家都是透過某種協議一起賺錢。
後續微軟和OpenAI的合作模式將會如何?日後找機會推論並簡單驗證微軟CEO Satya Nadella的命盤,再把��人的七星定點互相帶入對方命盤,看兩人的對待關係。
~未完待續~
0 notes
ntaflos · 2 years ago
Text
Power Platform als verbundener Dienst für Visual Studio ist allgemein verfügbar
Power Platform, Visual Studio 2022, Custom Connectors, Microsoft Power Apps, API, ASP.NET Core Web API, Power Platform CLI, Canvas-App, Power Fx, mobiles Erlebnis, Legacy-APIs, Marcel Ferreira
Ich bin auf den Autor Marcel Ferreira aufmerksam geworden. Mit meinem Beitrag möchte ich auf seine spannende Ankündigung aufmerksam machen, die für Entwickler von großem Interesse sein dürfte. Während der Microsoft Build 2023 wurde die Möglichkeit angekündigt, benutzerdefinierte Connectors innerhalb von Visual Studio zu erstellen, um schnell eine Front-End für Ihre API mit Microsoft Power Apps…
Tumblr media
View On WordPress
0 notes
mostlysignssomeportents · 20 days ago
Text
Are the means of computation even seizable?
Tumblr media
I'm on a 20+ city book tour for my new novel PICKS AND SHOVELS. Catch me in PITTSBURGH in TOMORROW (May 15) at WHITE WHALE BOOKS, and in PDX on Jun 20 at BARNES AND NOBLE with BUNNIE HUANG. More tour dates (London, Manchester) here.
Tumblr media
Something's very different in tech. Once upon a time, every bad choice by tech companies – taking away features, locking out mods or plugins, nerfing the API – was countered, nearly instantaneously, by someone writing a program that overrode that choice.
Bad clients would be muscled aside by third-party clients. Locked bootloaders would be hacked and replaced. Code that confirmed you were using OEM parts, consumables or adapters would be found and nuked from orbit. Weak APIs would be replaced with muscular, unofficial APIs built out of unstoppable scrapers running on headless machines in some data-center. Every time some tech company erected a 10-foot enshittifying fence, someone would show up with an 11-foot disenshittifying ladder.
Those 11-foot ladders represented the power of interoperability, the inescapable bounty of the Turing-complete, universal von Neumann machine, which, by definition, is capable of running every valid program. Specifically, they represented the power of adversarial interoperability – when someone modifies a technology against its manufacturer's wishes. Adversarial interoperability is the origin story of today's tech giants, from Microsoft to Apple to Google:
https://www.eff.org/deeplinks/2019/10/adversarial-interoperability
But adversarial interop has been in steady decline for the past quarter-century. These big companies moved fast and broke things, but no one is returning the favor. If you ask the companies what changed, they'll just smirk and say that they're better at security than the incumbents they disrupted. The reason no one's hacked up a third-party iOS App Store is that Apple's security team is just so fucking 1337 that no one can break their shit.
I think this is nonsense. I think that what's really going on is that we've made it possible for companies to design their technologies in such a way that any attempt at adversarial interop is illegal.
"Anticircumvention" laws like Section 1201 of the 1998 Digital Millennium Copyright Act make bypassing any kind of digital lock (AKA "Digital Rights Management" or "DRM") very illegal. Under DMCA, just talking about how to remove a digital lock can land you in prison for 5 years. I tell the story of this law's passage in "Understood: Who Broke the Internet," my new podcast series for the CBC:
https://pluralistic.net/2025/05/08/who-broke-the-internet/#bruce-lehman
For a quarter century, tech companies have aggressively lobbied and litigated to expand the scope of anticircumvention laws. At the same time, companies have come up with a million ways to wrap their products in digital locks that are a crime to break.
Digital locks let Chamberlain, a garage-door opener monopolist block all third-party garage-door apps. Then, Chamberlain stuck ads in its app, so you have to watch an ad to open your garage-door:
https://pluralistic.net/2023/11/09/lead-me-not-into-temptation/#chamberlain
Digital locks let John Deere block third-party repair of its tractors:
https://pluralistic.net/2022/05/08/about-those-kill-switched-ukrainian-tractors/
And they let Apple block third-party repair of iPhones:
https://pluralistic.net/2022/05/22/apples-cement-overshoes/
These companies built 11-foot ladders to get over their competitors' 10-foot walls, and then they kicked the ladder away. Once they were secure atop their walls, they committed enshittifying sins their fallen adversaries could only dream of.
I've been campaigning to abolish anticircumvention laws for the past quarter-century, and I've noticed a curious pattern. Whenever these companies stand to lose their legal protections, they freak out and spend vast fortunes to keep those protections intact. That's weird, because it strongly implies that their locks don't work. A lock that works works, whether or not it's illegal to break that lock. The reason Signal encryption works is that it's working encryption. The legal status of breaking Signal's encryption has nothing to do with whether it works. If Signal's encryption was full of technical flaws but it was illegal to point those flaws out, you'd be crazy to trust Signal.
Signal does get involved in legal fights, of course, but the fights it gets into are ones that require Signal to introduce defects in its encryption – not fights over whether it is legal to disclose flaws in Signal or exploit them:
https://pluralistic.net/2023/03/05/theyre-still-trying-to-ban-cryptography/
But tech companies that rely on digital locks manifestly act like their locks don't work and they know it. When the tech and content giants bullied the W3C into building DRM into 2 billion users' browsers, they categorically rejected any proposal to limit their ability to destroy the lives of people who broke that DRM, even if it was only to add accessibility or privacy to video:
https://www.eff.org/deeplinks/2017/09/open-letter-w3c-director-ceo-team-and-membership
The thing is, if the lock works, you don't need the legal right to destroy the lives of people who find its flaws, because it works.
Do digital locks work? Can they work? I think the answer to both questions is a resounding no. The design theory of a digital lock is that I can provide you with an encrypted file that your computer has the keys to. Your computer will access those keys to decrypt or sign a file, but only under the circumstances that I have specified. Like, you can install an app when it comes from my app store, but not when it comes from a third party. Or you can play back a video in one kind of browser window, but not in another one. For this to work, your computer has to hide a cryptographic key from you, inside a device you own and control. As I pointed out more than a decade ago, this is a fool's errand:
https://memex.craphound.com/2012/01/10/lockdown-the-coming-war-on-general-purpose-computing/
After all, you or I might not have the knowledge and resources to uncover the keys' hiding place, but someone does. Maybe that someone is a person looking to go into business selling your customers the disenshittifying plugin that unfucks the thing you deliberately broke. Maybe it's a hacker-tinkerer, pursuing an intellectual challenge. Maybe it's a bored grad student with a free weekend, an electron-tunneling microscope, and a seminar full of undergrads looking for a project.
The point is that hiding secrets in devices that belong to your adversaries is very bad security practice. No matter how good a bank safe is, the bank keeps it in its vault – not in the bank-robber's basement workshop.
For a hiding-secrets-in-your-adversaries'-device plan to work, the manufacturer has to make zero mistakes. The adversary – a competitor, a tinkerer, a grad student – only has to find one mistake and exploit it. This is a bedrock of security theory: attackers have an inescapable advantage.
So I think that DRM doesn't work. I think DRM is a legal construct, not a technical one. I think DRM is a kind of magic Saran Wrap that manufacturers can wrap around their products, and, in so doing, make it a literal jailable offense to use those products in otherwise legal ways that their shareholders don't like. As Jay Freeman put it, using DRM creates a new law called "Felony Contempt of Business Model." It's a law that has never been passed by any legislature, but is nevertheless enforceable.
In the 25 years I've been fighting anticircumvention laws, I've spoken to many government officials from all over the world about the opportunity that repealing their anticircumvention laws represents. After all, Apple makes $100b/year by gouging app makers for 30 cents on ever dollar. Allow your domestic tech sector to sell the tools to jailbreak iPhones and install third party app stores, and you can convert Apple's $100b/year to a $100m/year business for one of your own companies, and the other $999,900,000,000 will be returned to the world's iPhone owners as a consumer surplus.
But every time I pitched this, I got the same answer: "The US Trade Representative forced us to pass this law, and threatened us with tariffs if we didn't pass it." Happy Liberation Day, people – every country in the world is now liberated from the only reason to keep this stupid-ass law on their books:
https://pluralistic.net/2025/01/15/beauty-eh/#its-the-only-war-the-yankees-lost-except-for-vietnam-and-also-the-alamo-and-the-bay-of-ham
In light of the Trump tariffs, I've been making the global rounds again, making the case for an anticircumvention repeal:
https://www.ft.com/content/b882f3a7-f8c9-4247-9662-3494eb37c30b
One of the questions I've been getting repeatedly from policy wonks, activists and officials is, "Is it even possible to jailbreak modern devices?" They want to know if companies like Apple, Tesla, Google, Microsoft, and John Deere have created unbreakable digital locks. Obviously, this is an important question, because if these locks are impregnable, then getting rid of the law won't deliver the promised benefits.
It's true that there aren't as many jailbreaks as we used to see. When a big project like Nextcloud – which is staffed up with extremely accomplished and skilled engineers – gets screwed over by Google's app store, they issue a press-release, not a patch:
https://arstechnica.com/gadgets/2025/05/nextcloud-accuses-google-of-big-tech-gatekeeping-over-android-app-permissions/
Perhaps that's because the tech staff at Nextcloud are no match for Google, not even with the attacker's advantage on their side.
But I don't think so. Here's why: we do still get jailbreaks and mods, but these almost exclusively come from anonymous tinkerers and hobbyists:
https://consumerrights.wiki/Mazda_DMCA_takedown_of_Open_Source_Home_Assistant_App
Or from pissed off teenagers:
https://www.theverge.com/2022/9/29/23378541/the-og-app-instagram-clone-pulled-from-app-store
These hacks are incredibly ambitious! How ambitious? How about a class break for every version of iOS as well as an unpatchable hardware attack on 8 years' worth of Apple bootloaders?
https://pluralistic.net/2020/05/25/mafia-logic/#sosumi
Now, maybe it's the case at all the world's best hackers are posting free code under pseudonyms. Maybe all the code wizards working for venture backed tech companies that stand to make millions through clever reverse engineering are just not as mad skilled as teenagers who want an ad-free Insta and that's why they've never replicated the feat.
Or maybe it's because teenagers and anonymous hackers are just about the only people willing to risk a $500,000 fine and 5-year prison sentence. In other words, maybe the thing that protects DRM is law, not code. After all, when Polish security researchers revealed the existence of secret digital locks that the train manufacturer Newag used to rip off train operators for millions of euros, Newag dragged them into court:
https://fsfe.org/news/2025/news-20250407-01.en.html
Tech companies are the most self-mythologizing industry on the planet, beating out even the pharma sector in boasting about their prowess and good corporate citizenship. They swear that they've made a functional digital lock…but they sure act like the only thing those locks do is let them sue people who reveal their workings.
Tumblr media
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2025/05/14/pregnable/#checkm8
424 notes · View notes