
Search results for 'General' - Page: 3
| sharechat.co.nz - 20 Mar (sharechat.co.nz) Capital is the lifeblood of prosperity, but New Zealand doesn’t have enough, says the managing director of a leading private financial services provider Read...Newslink ©2025 to sharechat.co.nz |  |
|  | | PC World - 20 Mar (PC World)Nvidia, AMD, and Intel have all latched onto AI-powered techniques as a way to enhance their graphics capabilities. Now Arm has entered the arena, shipping a new Arm Accuracy Super Resolution (Arm ASR) technology that’s based on something AMD previously developed.
Arm ASR was initially developed for mobile GPUs, not for PCs. But Arm showed off Arm ASR in a demonstration for Unreal 5, running its desktop renderer on a mobile platform. All told, Arm ASR sped up the rendering engine by 30 percent, suggesting that Arm’s customers—including Qualcomm with its Snapdragon PCs—could use the technology to eventually speed up PC graphics as well.
Arm ASR, which was first announced a year ago, is being released today as an Unreal Engine plugin. A Unity plugin will be available later this year. Arm said that it plans to expand Arm ASR to other platforms, without specifying exactly which ones or when.
Arm ASR is built upon AMD’s FidelityFX Super Resolution 2 (FSR 2), the older and simpler version that takes lower-resolution images and upscales them, boosting frame rates via faster processing. (AMD’s later iterations, including FSR 3 and FSR 4, also include frame generation.) Arm ASR uses temporal upscaling, however, said to be an improved version.
Arm showed off Arm ASR in its new demonstration video:
Arm said that game developers just need to enable the ASR plugin, configure the project settings to use Temporal Anti-Aliasing, and verify the integration. “Prominent game studios, including Enduring Games, Infold Games, and Sumo Digital, have integrated Arm ASR into their development processes, leading to improved game performance at the same visual quality,” Arm said.
At this point, it’s not clear whether or not licensees like Qualcomm will have access to Arm ASR, given the unexpected IP litigation that’s been brewing between the two. Last week, Qualcomm said that it had filed two additional briefs in its fight against Arm, which was largely settled in Qualcomm’s favor after Arm unexpectedly tried to cancel Qualcomm’s IP license. Those recent briefs ask the court to rule against Arm in an unresolved claim in the IP trial. The second motion supports Qualcomm’s separate attempt to sue Arm for breach of contract.
It is true, however, that the Windows on Arm platform in general has struggled to run games, largely because of compatibility issues. As Qualcomm and the Arm ecosystem continue to try and resolve that issue, Arm ASR will probably make gaming on Arm more attractive to developers and end customers alike. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 18 Mar (PC World)When DeepSeek-R1 released back in January, it was incredibly hyped up. This reasoning model could be distilled down to work with smaller large language models (LLMs) on consumer-grade laptops. If you believed the headlines, you’d think it’s now possible to run AI models that are competitive with ChatGPT right on your toaster.
That just isn’t true, though. I tried running LLMs locally on a typical Windows laptop and the whole experience still kinda sucks. There are still a handful of problems that keep rearing their heads.
Problem #1: Small LLMs are stupid
Newer open LLMs often brag about big benchmark improvements, and that was certainly the case with DeepSeek-R1, which came close to OpenAI’s o1 in some benchmarks.
But the model you run on your Windows laptop isn’t the same one that’s scoring high marks. It’s a much smaller, more condensed model—and smaller versions of large language models aren’t very smart.
Just look at what happened when I asked DeepSeek-R1-Llama-8B how the chicken crossed the road:
Matt Smith / Foundry
This simple question—and the LLM’s rambling answer—shows how smaller models can easily go off the rails. They frequently fail to notice context or pick up on nuances that should seem obvious.
In fact, recent research suggests that less intelligent large language models with reasoning capabilities are prone to such faults. I recently wrote about the issue of overthinking in AI reasoning models and how they lead to increased computational costs.
I’ll admit that the chicken example is a silly one. How about we try a more practical task? Like coding a simple website in HTML. I created a fictional resume using Anthropic’s Claude 3.7 Sonnet, then asked Qwen2.5-7B-Instruct to create a HTML website based on the resume.
The results were far from great:
Matt Smith / Foundry
To be fair, it’s better than what I could create if you sat me down at a computer without an internet connection and asked me to code a similar website. Still, I don’t think most people would want to use this resume to represent themselves online.
A larger and smarter model, like Anthropic’s Claude 3.7 Sonnet, can generate a higher quality website. I could still criticize it, but my issues would be more nuanced and less to do with glaring flaws. Unlike Qwen’s output, I expect a lot of people would be happy using the website Claude created to represent themselves online.
And, for me, that’s not speculation. That’s actually what happened. Several months ago, I ditched WordPress and switched to a simple HTML website that was coded by Claude 3.5 Sonnet.
Problem #2: Local LLMs need lots of RAM
OpenAI’s CEO Sam Altman is constantly chin-wagging about the massive data center and infrastructure investments required to keep AI moving forward. He’s biased, of course, but he’s right about one thing: the largest and smartest large language models, like GPT-4, do require data center hardware with compute and memory far beyond that of even the most extravagant consumer PCs.
And it isn’t just limited to the best large language models. Even smaller and dumber models can still push a modern Windows laptop to its limits, with RAM often being the greatest limiter of performance.
Matt Smith / Foundry
The “size” of a large language model is measured by its parameters, where each parameter is a distinct variable used by the model to generate output. In general, more parameters mean smarter output—but those parameters need to be stored somewhere, so adding parameters to a model increases its storage and memory requirements.
Smaller LLMs with 7 or 8 billion parameters tend to weigh in at 4.5 to 5 GB. That’s not huge, but the entire model must be loaded into memory (i.e., RAM) and sit there for as long as the model is in use. That’s a big chunk of RAM to reserve for a single piece of software.
While it’s technically possible to run an AI model with 7 billion parameters on a laptop with 16GB of RAM, you’ll more realistically need 32GB (unless the LLM is the only piece of software you’ll have opened). Even the Surface Laptop 7 that I use to test local LLMs, which has 32GB of RAM, can run out of available memory if I have a video editing app or several dozen browser tabs open while the AI model is active.
Problem #3: Local LLMs are awfully slow
Configuring a Windows laptop with more RAM might seem like an easy (though expensive) solution to Problem #2. If you do that, however, you’ll run straight into another issue: modern Windows laptops lack the compute performance required by LLMs.
I experienced this problem with the HP Elitebook X G1a, a speedy laptop with an AMD Ryzen AI processor that includes capable integrated graphics and an integrated neural processing unit. It also has 64GB of RAM, so I was able to load Llama 3.3 with 70 billion parameters (which eats up about 40GB of memory).
The fictional resume HTML generation took 66.61 seconds to first token and an additional 196.7 seconds for the rest. That’s significantly slower than, say, ChatGPT.Matt Smith / Foundry
Yet even with that much memory, Llama 3.3-70B still wasn’t usable. Sure, I could technically load it, but it could only output 1.68 tokens per second. (It takes about 1 to 3 tokens per word in a text reply, so even a short reply can take a minute or more to generate.)
More powerful hardware could certainly help, but it’s not a simple solution. There’s currently no universal API that can run all LLMs on all hardware, so it’s often not possible to properly tap into all the compute resources available on a laptop.
Problem #4: LM Studio, Ollama, GPT4All are no match for ChatGPT
Everything I’ve complained about up to this point could theoretically be improved with hardware and APIs that make it easier for LLMs to utilize a laptop’s compute resources. But even if all that were to fall into place, you’d still have to wrestle with the unintuitive software.
By software, I mean the interface used to communicate with these LLMs. Many options exist, including LM Studio, Ollama, and GPT4All. They’re free and impressive—GPT4All is surprisingly easy—but they just aren’t as capable or easy-to-use as ChatGPT, Anthropic, and other leaders.
Managing and selecting local LLMs using LM Studio is far less intuitive than loading up a mainstream AI chatbot like ChatGPT, Copilot, or Claude.Matt Smith / Foundry
Plus, local LLMs are less likely to be multimodal, meaning most of them can’t work with images or audio. Most LLM interfaces support some form of RAG to let you “talk” with documents, but context windows tend to be small and document support is often limited. Local LLMs also lack the cutting-edge features of larger online-only LLMs, like OpenAI’s Advanced Voice Mode and Claude’s Artifacts.
I’m not trying to throw shade at local LLM software. The leading options are rather good, plus they’re free. But the honest truth is that it’s hard for free software to keep up with rich tech giants—and it shows.
Solutions are coming, but it’ll be a long time before they get here
The biggest problem of all is that there’s currently no way to solve any of the above problems.
RAM is going to be an issue for a while. As of this writing, the most powerful Windows laptops top out at 128GB of RAM. Meanwhile, Apple just released the M3 Ultra, which can support up to 512GB of unified memory (but you’ll pay at least $9,499 to snag it).
Compute performance faces bottlenecks, too. A laptop with an RTX 4090 (soon to be superseded by the RTX 5090) might look like the best option for running an LLM—and maybe it is—but you still have to load the LLM into the GPU’s memory. An RTX 5090 will offer 24GB of GDDR7 memory, which is relatively a lot but still limited and only able to support AI models up to around 32 billion parameters (like QwQ 32B).
Even if you ignore the hardware limitations, it’s unclear if software for running locally hosted LLMs will keep up with cloud-based subscription services. (Paid software for running local LLMs is a thing but, as far as I’m aware, only in the enterprise market.) For local LLMs to catch up with their cloud siblings, we’ll need software that’s easy to use and frequently updated with features close to what cloud services provide.
These problems will probably be fixed with time. But if you’re thinking about trying a local LLM on your laptop right now, don’t bother. It’s fun and novel but far from productive. I still recommend sticking with online-only models like GPT-4.5 and Claude 3.7 Sonnet for now.
Further reading: I paid $200/mo for ChatGPT Pro so you don’t have to Read...Newslink ©2025 to PC World |  |
|  | | PC World - 18 Mar (PC World)Some PC gamers use the terms frame rate and refresh rate interchangeably. But while they’re related, your gaming PC’s frame rate and refresh rate measure two very different things — one fixed, the other varies.
Frame rate explained
The frame rate, which is measured in frames per second (FPS), indicates the number of images displayed on the monitor per second. The higher the number of frames, the smoother the animation appears. In games, FPS determines how smoothly you see the animations and how quickly inputs are registered. A low FPS means that animations are not displayed correctly or are even skipped completely, which can lead to a stuttering display.
Radeon RX 9070 XT
Read our review
The performance of the graphics card (GPU) and the processor (CPU) mainly influences the FPS. The GPU does the main work in most games while the CPU plays a particularly important role in games with complex calculations such as physics or artificial intelligence. 30 FPS is considered acceptable for many games that do not rely on fast reactions. However, 60 FPS is the target for most games in order to guarantee a smooth experience. Higher FPS such as 120 or 144 offer advantages in competitive games in which every millisecond counts.
Refresh rate explained
The refresh rate, measured in Hertz (Hz), indicates how often the screen refreshes the image per second. The refresh rate depends on the display technology and the capabilities of the screen. Standard monitors offer a refresh rate of 60 Hz, which is sufficient for general use and casual gamers. However, gaming monitors can go up to 500 Hz.
MSI MPG 341CQPX
Read our review
Best Prices Today:
$749.99 at Amazon |
$849.99 at MSI
Although both the refresh rate and the frame rate are crucial for smooth displays, there are important differences. For example, the frame rate is mainly influenced by the GPU while the refresh rate depends solely on the monitor technology.
It’s crucial that the frame rate does not exceed the refresh rate of the monitor, as this can otherwise lead to image errors such as tearing. An imbalance can also lead to stuttering, which is when the image is displayed several times in succession. To achieve the best results, you should check the refresh rate of your monitor and adjust the frame rate in the game settings accordingly. For example, if your monitor has a refresh rate of 60 Hz, you should set the game to 60 FPS.
Tearing (image tearing) is a problem with asynchronous refresh rates and refresh rates. However, there are techniques to prevent this.
IDG
Technologies such as VSync, G-Sync, or FreeSync can help here. VSync synchronizes the FPS with the refresh rate to prevent tearing, but leads to a slight input delay. G-Sync and FreeSync flexibly adjust the refresh rate of the screen to the FPS to prevent tearing without causing a noticeable input delay. A balanced combination of refresh rate and frame rate is essential for a smooth gaming experience. Additional frames that your computer calculates but your monitor cannot display will only waste resources and increase the load on your device. A customized balance between frame rate and refresh rate not only ensures a smooth display, but also protects your system’s hardware. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 17 Mar (PC World)Imagine being woken up late one Tuesday night by a phone call from your young relative. They’ve been in a car accident and urgently need money sent to their phone, not having their wallet on them. The connection is bad but it does sound like them. Still groggy and confused, you start making the transfer.
Only it’s not them calling you, they’re asleep, safe and sound. You’re talking to a robocall, steered by a scammer and made from a spoofed number. The scammer has cloned your relative’s voice by using their TikTok videos to train a so-called AI model. They’re sitting at a keyboard, guiding the conversation, probably from a country halfway around the globe.
Let’s take a closer look at what’s happening here. There are two threads that come together in these kinds of scams: the popularity of imposter calls (even as robocalls continue to decline) and the increasing availability of voice-cloning technology.
Imposter calls holding steady
According to an Incogni study, reports of unwanted calls in general, and robocalls in particular, had generally been on the decline from 2017 to 2023. Still, robocalls accounted for 55% of all reported unwanted calls in 2023, even though the ratio of robocalls to live calls was also in decline from 2021 (3.1 robocalls to every live call) to 2023 (1.6:1).
Drilling down into the topics covered during unwanted calls, the same study found that “imposter calls” held steady as being the most common type of call from 2019 to 2023, making up around a third of all reported calls in 2022 and 2023. Imposter calls were defined as “all unwanted calls where the caller impersonated someone else, an agency, or a company.”
To impersonate someone, a scammer would need not only their number and yours, but also some basic information like the person’s name, age and sex. To make a more elaborate imposter call convincing, they’d need a whole host of additional personal data, like ethnicity, hobbies, shopping habits, online activity, criminal and court records, even sexual preferences. This is exactly the kind of data a personal information removal service like Incogni removes from circulation, online and off.
Protect yourself from imposter scams with Incogni
There’s a significant proportion of unwanted calls that rely on impersonation. It’s reasonable to assume that a large number of these calls are scam calls, as it’s difficult to imagine a legitimate reason for a caller pretending to be someone else. What happens when new technologies make it easier for scammers to impersonate not only celebrities and politicians, but everyday people as well?
Voice-cloning technology enters the mix
Recent advances in “AI” technology have resulted in high-quality voice-generating and voice-cloning software being readily available, often for free. These technologies make the nightmare scenario of someone cloning the voice of a loved one and impersonating them on the phone possible.
Combined with number spoofing (making Caller ID display a number different from the one they’re calling from) and the availability of vast amounts of personal information online—including, for many people, voice-samples—these technologies can make for some extremely convincing impersonations.
Here’s how a criminal could execute such a scam:
Step 1: Target selection
If they’re going to go after you, it’s going to have to be worth their while. Scammers can:
Buy a ready-made list of people vulnerable to scams directly from a data broker,
Browse data broker records, looking for the perfect victim (like someone who’s older and has just sold a property, for example),
Buy or download breached or leaked data sets on the dark web,
Come across your social media profiles and decide to target you based on what you share there.
Ultimately, anything that suggests to a scammer that you both have something worth stealing and are sufficiently gullible is enough to make you a target.
Step 2: Background research
A scammer is going to need to know at least a few key things about you if they’re going to target you with a convincing scenario. These are some of the more common data points used in impersonation scams:
Full name,
Contact details, like phone number, email and address,
Employment history,
Educational background,
Financial situation,
Criminal history,
Relatives,
Known associates.
And, of course, they’ll need a similar set of data points on each of your relatives and associates, especially if they’re going to be impersonating one or more of them. Where can they find all this data, nicely packaged into detailed profiles?
Data brokers are companies that specialize in collecting, organizing, and monetizing personal information just like this. With trial memberships available for as little as $1, basically anyone can end up with detailed profiles on you and your close ones with just a few clicks. Personal information removal services like Incogni take these profiles down and request that data brokers stop collecting your data.
Remove yourself from the web with Incogni
Step 3: Collecting voice samples (optional)
If the scammer is planning on impersonating someone over the phone, they’ll need some recordings of that person speaking to give their “AI” software something to imitate. If you post videos of yourself on social media, have a YouTube channel or have appeared on a podcast, this won’t be a problem for them.
Step 4: Number spoofing (also optional)
Again, if the scammer is impersonating someone close to you, it’d be more convincing if the call appeared to be coming from that person’s number. There are several ways to achieve this at little-to-no cost to the scammer, although it might require some technical know-how.
They can’t spoof a number they don’t know, though, so having this kind of personal data purged from the internet can stop even these very technical attacks dead in their tracks.
Step 5: Execution
By now, the scammer now knows a lot about you, about the person they’re going to impersonate, and your shared network of friends, colleagues and relatives. They just need to choose the right time (often when you’re likely to be tired, in a rush or distracted) and make the call.
The relative simplicity of perpetrating a fraud like this goes some way to explaining why the FCC made the use of “AI-generated voices” in robocalls illegal in 2024. Of course, making something illegal only discourages law-abiding people from doing it—scammers are unlikely to take notice.
You might be feeling pretty safe at this point: maybe your loved ones don’t have any voice-recordings out there for the scammer to sample, maybe your phone or carrier has anti-spoofing measures in place, maybe you’re confident that you’d pick up on the fake voice, even if the scammer lowers the audio quality and adds background noise.
The fact is, if you’re an everyday person with not much of an online presence and not much in the way of money to lose, then it’s unlikely you’d be targeted with such an involved scam.
The more likely nightmare scenario
We started with a scenario in which a scammer clones the voice of someone close to you. But we also saw that the voice-cloning and number-spoofing steps are optional—how so? Well, if the scammer knows enough about you and your close one, they don’t need to impersonate them for the scam to work.
It’s late Tuesday night, you’re asleep when your phone wakes you up. You don’t recognize the number. You pick up. It’s a police officer, he says your young relative has been in a car accident and they’re in custody. Your relative asked the police officer to call you, they want to keep the situation under wraps until they can talk to their parents. In the meantime, they need you to bail them out.
Still groggy and confused, you start making the transfer.
In this scenario, the scammer doesn’t need to sound like anyone in particular, just a random police officer. The need for voice cloning goes away, as does the need for number spoofing. The scammer might still need to synthesize a voice, to cover up poor English skills or a suspiciously strong accent, for example, but that’s easy enough to do.
All they really need is to find your and your relative’s records on a data broker’s website.
What you can do
Staying off social media is always a good idea, but not always feasible. Also, not taking part in recorded interviews or presenting your ideas publicly just to avoid voice-cloning attacks seems like throwing the baby out with the bathwater.
Scammers can’t or at least aren’t likely to target you if they can’t find your information on data brokers’ websites in the first place. They also can’t easily figure out who your friends and family are (especially if you’ve set your social media profiles to “private”).
There’s a big difference between a “police officer” calling you to ask about your nephew Daniel Thomas Walsh, born on the 11th of March, 2006, who drives a blue Silverado and would have been on his way home from work at the pizza place, and the same “police officer” umming and ahhing as he can’t really give any details concerning Daniel other than his name.
Take scammers’ best tool away from them by having your personal information removed from data-broker databases. An automated personal information removal service like Incogni can make this an easy, set-and-forget process.
When choosing a data removal service, look for one that covers a wide range of data brokers, including marketing, recruitment, risk-mitigation, and people-search data brokers. Many services remove data only from people search sites, leaving users exposed.
Incogni covers all four of these data broker types, removing personal information from over 220 brokers in total. It also offers a family plan, so you can keep your and your nephew’s information private.
Get Incogni Read...Newslink ©2025 to PC World |  |
|  | | PC World - 17 Mar (PC World)Every online action leaves a digital footprint that influences your online identity. This footprint can have both positive and negative effects. To protect one’s online presence, it’s essential to understand what the digital footprint is and the potential consequences of leaving it online. This article will discuss these risks, provide tips on how to protect your information and highlight the importance of online security tools like Surfshark Antivirus to keep your personal data safe.
What is a digital footprint?
A digital footprint, electronic footprint, or digital shadow is the activities and traceable data you leave behind online. It can include things like logging into an app, browsing the web, posting on social media, etc. One simple use of digital footprint is advertising — advertisers can gather information about your interests and preferences from your digital footprint and show you targeted ads.
There are two types of digital footprints:
? Active digital footprint consists of the data you intentionally leave online, such as posts or comments you make on social media, newsletter subscriptions, and online purchases;
? Passive digital footprint consists of data that might be collected without you knowing. It simply depends on website cookies — they track your visits, IP (Internet Protocol) address, biometric and geolocation information, and more.
Let’s look at some numbers. According to Surfshark’s study on digital footprints, people use nine apps on average for 4 to 5 hours every day, mainly for social interactions. The average smartphone user can generate up to 188 digital footprints daily. Of course, developers use some data to improve your apps, so not all data is used for malicious purposes, but the numbers are still shocking.
So, understanding your digital footprint is important, but effectively managing it is crucial. Failing to do so can lead to serious consequences. Let’s explore the possible outcomes.
What are the consequences of leaving a digital footprint?
Your digital footprint can heavily influence how you access your accounts, impact your online reputation, and determine the advertisements you see online. It also increases the risk of being hacked.
For example, if a cybercriminal gets a hold of your digital footprint, they can impersonate you and trick the people close to you to give out your personal information. Or, if a service you use experiences a data breach, they could leak your sensitive data.
What’s even worse is that your digital footprint can be easily accessible. Data brokers, advertisers, mobile carriers, internet providers, co-workers, hackers, and other internet users can find it, too.
Given the potential risks, taking proactive measures to protect your digital footprint and safeguard your personal information online is crucial.
How can you protect your digital footprint?
To minimize your active digital footprint, limit the amount of data you share online, adjust your privacy settings, delete old accounts that are no longer in use, and avoid untrusted websites. As for protecting your passive digital footprint, you should consider more advanced security measures, such as using Surfshark Antivirus, which is part of Surfshark One and Surfshark One+ plans.
How can Surfshark Antivirus protect your digital footprint?
Surfshark Antivirus provides powerful device protection against malware and other cyberthreats. It can help safeguard your digital footprint by performing the following:
? Protecting devices from malware, like keyloggers, that secretly gather your data;
? Scanning for threats in real-time to prevent harmful software from accessing your data;
? Finding and removing adware — software that shows ads and collects user data.
Additionally, Surfshark Antivirus also offers the following:
? Real-time protection;
? Webcam protection;
? Fully customizable security;
? Prevention of online activity tracking by ad companies and bots.
Let’s say you’re already following the general security tips and using Surfshark Antivirus. What more can you do to safeguard yourself as much as possible? You can try other products that are included in the Surfshark One and Surfshark One+ plans. Let’s discover how they can help you protect your digital footprint.
View Surfshark antivirus
Additional security measures to protect your digital footprint
Surfshark stands out for its multifunctionality. Their Surfshark One package includes a full array of security products: Surfshark VPN, Surfshark Antivirus, Surfshark Alert, Surfshark Search, and Alternative ID. With Surfshark One+, you can also get a data removal service called Incogni.
To protect your active digital footprint, consider using the following products:
? Alternative ID: Protects your main email from spam and safeguards it from breaches;
? Surfshark Alert: Monitors your emails, credit cards, and personal identification number and provides immediate data leak alerts.
To protect your passive digital footprint, consider using the following products:
? Surfshark VPN: Enhances your online privacy by hiding your IP address and encrypting your connection and prevents tracking by websites, ISPs, and hackers;
? Surfshark Search: Delivers unbiased and ad-free search results by not logging queries or search history;
? Incogni: Requests data brokers to delete your data from their databases and monitors their compliance to prevent your data from being collected or sold again.
Using Surfshark Antivirus can be your first step toward taking proactive steps to safeguard your digital footprint. However, if you’re really concerned about your privacy, it’s worth looking into and using other bundled products.
Final thoughts on securing your digital footprint
Understanding your digital footprint is crucial for online security, but managing it is what really matters. For your active footprint, limit the information you share online, update your privacy settings, and perform a spring cleaning of your old accounts. For the passive footprint, consider advanced security measures like Surfshark Antivirus, which protects against malware, scans for threats in real-time, and removes adware. And be sure to take advantage of the full Surfshark bundle to access all the additional cybersecurity tools available to you.
View Surfshark antivirus Read...Newslink ©2025 to PC World |  |
|  | | PC World - 17 Mar (PC World)There are many reasons you might want to “delete yourself” from the internet. From receiving frustrating amounts of spam to protecting yourself from carefully crafted scams fueled by the availability of personal data. But it goes much deeper than that.
Having your personal information floating around online leaves you more vulnerable to identity theft, a type of fraud that can lead to criminals opening lines of credit in your name. Stalkers can use location and other data to commit their crimes. Even the seemingly more mundane uses of personal data can be enough to make you want to delete yourself from the internet.
You might find loan applications being inexplicably rejected, insurance premiums going up or job searches getting drawn out. Companies checking your credit rating is one thing, but these effects could stem from inaccurate, outdated or irrelevant information being used in decision-making processes that affect you in very real ways.
What it means to “delete yourself from the internet”
We’re not talking about completely disappearing from the internet. For one, this is very difficult if not impossible to do, even if you were to throw near-unlimited resources at the problem. It’s also probably not something you’d want to do even if you could.
There’s a way you can keep making use of all the benefits the internet has to offer—like the unparalleled shopping, communication and information-sharing opportunities—without leaving yourself needlessly vulnerable to all the downsides.
The key is getting your personal information under control. You don’t need to delete yourself entirely, it’s often enough to remove your personal information from circulation. “Personal information” includes things like your:
Current and past names, and any aliases
Current and past addresses
Email addresses
Phone numbers
Educational background
Work history
Income bracket
Licenses
Certifications
Marital status
Sexual orientation
Financial information
Criminal record
Court records
And much, much more.
Not exactly the kinds of details you’d want shady companies to package and resell behind your back, or put on Google Search so that anyone can buy access to them for as little as a dollar. There are two ways to tackle this problem, and you’ll need to do both to see long-term results:
Figure out how you’re putting personal information online and bring it down to a level with which you’re comfortable
Put a stop to companies grabbing and publishing or otherwise disseminating what personal data you do end up generating down the line.
Just going about your day-to-day business generates personal data that can then be scooped up by companies that know how to monetize it at your expense. Everything from doing some online shopping to selling a house or vehicle leaves traces.
Stop any personal information that’s already out there from being spread around
We’re starting here because you’ve already got personal information doing the rounds online—pretty much everyone does. So the first thing you’ll need to do is interrupt the flow of what’s already out there. There are a couple of things you can do to make this happen.
Stop companies packaging and selling your personal information online and off
There are companies—called data brokers—that specialize in collecting, organizing and selling personal information. They get your personal data by scraping the web, purchasing or otherwise acquiring ready-made profiles, or a combination of the two. The most visible data brokers are commonly known as “people finder” or “people search” sites.
You can see examples of these sites, and the information they have on you, simply by performing a web search for your full name, address or phone number. These sites will likely show you a free “teaser” of your profile, with the full records being locked behind a paywall.
It gets worse: people search sites are just the tip of the data brokerage iceberg. Many data brokers operate in the background, selling personal information to other businesses and organizations rather than putting it on websites aimed at individuals. You won’t find these companies by simply searching for your details, but they’re out there. Hundreds of them.
People search sites sell your data to anyone who’s willing to pay for access, including unscrupulous landlords, curious neighbours, nosy coworkers, stalkers, even scammers. Other data brokers will sell your data to:
Advertisers
Marketers
Government agencies
Insurance companies
Banks
Employers
And many more.
Thanks to state privacy laws like the California Consumer Privacy Act (CCPA), you can do something about this. To comply with laws like this, data brokers have to have an opt-out procedure in place to give people caught up in their personal-data dragnets a clear way out.
You can track down these companies one by one and submit an opt-out request to each one. Some are just a matter of a couple of clicks and take 5 minutes to complete, others can be a real nightmare and can take 45 minutes or more. Add the time it takes to find them in the first place, and you’re looking at hundreds of hours in total.
Or, you can sign up for an automated personal information removal service, like Incogni. These services already know where to find some of the most connected brokers and how to submit opt-out requests in line with their requirements—because virtually every one has a different procedure to follow.
Incogni makes it easy for anyone to remove their personal information from being searched online. Subscribers get a 30-day moneyl-back guarantee on automated data removal services, including recurring removal from 220+ data broker sites. With flexible plans for just $7.49/month for one person (billed annualyy) or $16.49/month for the family plan, Incogni offers privacy protections against identity theft, scam robocalls, and exposure after breached data.
Get Incogni
Remove your personal information from Google Search results
You’ve seen how a search engine can reveal your personal information to anyone who knows your name, address, email or phone number. With the latest “face-search” technology, they don’t even have to know that much, a surreptitiously taken photo is all it takes.
Google Search, with its monopoly over the search market, is likely the first place most people will look. Google won’t always agree to remove links from its search results and, even if it does, it can only remove links from Google Search: it can’t affect the content itself and it can’t stop that content from showing up on other search engines. To have content taken down at the source, you’ll need to contact the relevant webmaster.
Here’s a quick rundown of your options on Google Search:
Use this form to remove outdated content
Use this form to remove harmful or illegal content (as long as it violates Google’s terms of service)
Finally, use this form to remove content that contains “select personally identifiable information (PII) or doxxing content.”
Stop new personal information from getting out into the wild
Stopping data brokers from buying and selling your data and getting Google Search to remove your personal information from its search results can only do so much if you keep allowing new personal information to appear online. “Allowing” might be a bit harsh, given that you might not be aware of how some of your data is getting out there. We’ll get to that.
Stop publishing personal information online
Social media platforms are careful to use words like “share” when encouraging users to publish content, including personal information. “Sharing” makes it sound like you have some control over who sees what you post. But “publishing” is more accurate: social media posts are public by default.
The best advice is as predictable as it is inconvenient: delete your social media accounts to protect your privacy and delete yourself from the internet. Short of doing that, here’s a list of things you can do to limit the damage:
Switch from mainstream social media platforms like Facebook and X (Twitter) to decentralized and open-source platforms like Mastodon.
Set any social media profiles you decide to keep to private mode, so that only people you know and trust can see your posts.
Check and double-check anything you decide to post publicly for personal information, this will become second nature sooner than you might think.
Turn location services off on mobile devices before posting, many social media platforms will grab this information from your device, some will append it to your posts.
Check photos for anything that could reveal personal information, look out for reflections, documents, screens (that show private information), and unique identifiers like car registration plates.
Strip photos of metadata—metadata is text that’s automatically attached to photos and contains a lot of information about the location at which the photo was taken as well as the device on which it was taken.
Apply the same level of caution when uploading video and audio recordings.
The same holds true for any blogging or vlogging you do, the comments you leave on various platforms, and anything you post on forums.
Stop your devices from leaking personal information
The above best practices come into play when you’re actively publishing information online, but a lot of personal data leaves your devices when you’d least suspect it. Here are just some examples:
Apps and programs
Mobile apps and computer programs that have been granted access to location data, device information, microphone and camera inputs, and files (including documents, photos, videos and audio recordings) can leak personal information while you’re not even using them. Such apps and programs might have been set up to “dial home” periodically and upload your data. This might be necessary to support their features, or it might be to harvest data that’s then sold to advertisers in order to generate revenue—free apps are often monetized in this way.
Even apps developed with the most honest of intentions and collecting only the bare minimum of data can be hijacked by malicious actors (think: hackers) and have any data they have access to stolen (“breached”).
Delete any apps and programs you haven’t used in a while. For particularly data-hungry apps like Facebook, Amazon, and so on, consider using the respective websites instead.
Web browsers
Browsers are a special category of app or program, mainly because we do so much through a browser. They have access not only to hardware (like cameras and microphones), but also information (in the form of files) and—perhaps most importantly—to users’ behaviour and movements across the web. And no, “incognito” or “private” mode doesn’t do anything to help you here.
Diligently research any browser you decide to use. Options like Google’s Chrome are very secure but not private, whereas something like Mozilla’s Firefox is both secure and private. Stick to well-known and trusted browsers, avoid new browsers that don’t have an established track record, and watch out for browsers that had a good reputation in the past but have since changed hands.
Browser-based games
Games can take a lot of resources to develop and maintain, so you might wonder how so many impressive-looking browser-based games can be offered for free. Often, it’s by collecting and selling or otherwise monetizing personal information. Avoid free online, especially browser-based, games. Be particularly wary of games with development teams from countries like China and Russia.
Again, even games produced by the most trustworthy and well-intentioned developers can be breached by third parties. Any stockpile of personal data is going to be a target for hackers and other bad actors.
Operating systems
This is one that’s more for the technically minded, but it’s worth keeping in mind for everyone. The operating system on your device (whether Windows, macOS, Android or iOS) has access to everything you do on that device. Both Microsoft and Apple harvest personal data from their users, and both have business interests in protecting that data from competitors and bad actors.
There are two problems here: Microsoft and/or Apple having vast stores of your personal data is a bad thing in and of itself, and neither company is able to guarantee the security of that data—both have suffered and continue to suffer data breaches.
Alternatives exist, mainly in the form of Linux and the BSDs. These operating systems are open-source, meaning that anyone can review their source code to look for security vulnerabilities and privacy threats. As a result of this transparency, and the general absence of corporate interests, these systems are both more secure and more private.
The catch is that these operating systems are unfamiliar to most people, and can take some getting used to. Although the Linux operating system in particular has many extremely user-friendly “versions” (called distributions) available, and almost all of them are readily given away, free of charge.
Stop your online accounts from leaking personal information
We covered how publishing personal information online can jeopardize your privacy, but you don’t have to actively post things yourself for the information to get out there. If you’re active online, and especially if you do a lot of online shopping, you can easily have hundreds of online accounts out there. Many of which you probably only used once, to grab that Black Friday deal, for example.
Apart from the fact that you’re effectively trusting dozens if not hundreds of companies to not misuse your data, you’re also trusting that they won’t leave that data unsecured, that they won’t be bought out by less scrupulous companies, and so on.
The solution is simple, but it might require some tedious work: delete any accounts you don’t need anymore. If you’ve been using a password manager (like Bitwarden), this shouldn’t be too difficult. Otherwise, search through your emails for keywords like “welcome” and “verification” to ferret out evidence of old accounts.
Protect your data with Incogni Read...Newslink ©2025 to PC World |  |
|  | | sharechat.co.nz - 17 Mar (sharechat.co.nz) Under section 80(1)(b) of the Companies Act 1993, General Capital Limited (Company) is required to provide NZX Limited with the following disclosure in respect of the financial assistance provided to certain eligible employees (Participating Employees) in Read...Newslink ©2025 to sharechat.co.nz |  |
|  | | PC World - 15 Mar (PC World)The Raspberry Pi single-board computer and all its variants have captured the imaginations of DIY enthusiasts and budding hobbyists alike. With the latest model, the Raspberry Pi 5, the mini-PC is more capable than ever, with an upgraded four-core 2.4GHz system-on-chip (SoC) that’s up to three times faster than previous models.
Much of the coverage you’ll see around the web focuses on the more fantastical projects—magic mirrors, portable gaming handhelds, intelligent drones, and so forth. Those maker masterpieces certainly show what sort of power the sub-$100 mini-PC is capable of in the hands of someone with a little imagination and a bin full of spare electronics.
But most people, particularly beginners, won’t use the Raspberry Pi to whip up crazy creations. There are near-endless practical uses for this bare-bones kit, from media streaming to extending the range of your Wi-Fi network, as the following 10 projects demonstrate. Time to put that lil’ computer to real work. Heck, many of these projects will even work with the $10 Raspberry Pi Zero.
Further reading: I built a maxed-out Raspberry 5 PC with an SSD for under $200. You can too
HTPC media streaming
The original $35 Raspberry Pi may have been revolutionary to makers, but it took off with PC enthusiasts as well thanks to its ability to double as a dirt-cheap home-theater PC. That allure may have waned a bit in recent years as dedicated devices like the Chromecast hit the streets at similarly low prices, but using a Raspberry Pi as a media-streaming box still offers far more power than those streaming-centric sticks, especially if you have a sizeable local media collection.
There are a slew of HTPC-centric Raspberry Pi operating systems out there, each revolving around slapping your HD videos on the big screen. OSMC is built around the popular Kodi media center software (formerly XBMC), while RasPlex transforms your Pi into the ultimate Plex streaming box. The $21 Raspberry Pi TV Hat accessory, meanwhile, can grant your mini-PC the ability to read over-the-air TV signals.
Give a dumb TV smarts
Likewise, if you have a dumb TV that you’d like to add web browsing and other basic computing abilities to, the Raspberry Pi does the trick without costing anywhere near as much as a proper home theater PC. You’ll want to use a Raspberry Pi 2, 3, or 4, though—the original Pi and the Raspberry Pi Zero are just pokey enough to be frustrating for general tasks. With the right case, the Pi can look downright stylish in your home theater, too.
Bonus: If you’re connecting the Raspberry Pi to your TV, you can use it to stream web videos, too!
File storage server
You can also have your Raspberry Pi play wingman for the other devices in your house, serving as a centralized device that performs helpful tasks.
Case in point: You can use the mini-PC as a cheap NAS box for general file storage if you connect an external USB hard drive to the machine. Hit those links for technical details, and one tip if you’re planning to convert the computer to a file server: Use a wired ethernet connection rather than Wi-Fi if you’re able. Make sure you grab a solid external drive, too!
Wireless network printer
Printing isn’t as prevalent as it used to be, but the Raspberry Pi can help you transform that chunky old USB printer in your closet into a networked printer that every device in your house can use.
You’ll need a power source for each gadget, obviously, as well as a USB connection between the devices, but setting it up is pretty straightforward. This MakeUseOf tutorial walks you through the process step-by-step.
Extend your home’s Wi-Fi network
Raspberry Pi doesn’t make the home networks you use, but it can make the home networks you use better if you configure the mini-PC as a wireless range extender, tapping into the device’s ethernet and USB ports. Doing so can help your Wi-Fi signal reach the farthest corners of your house and help wipe out dead zones.
Configuring the device to bolster your home network will take a bit of time, and you’ll need to buy a USB Wi-Fi adapter to do it, but again, it’s relatively straightforward with a guide. Check out Adafruit’s reader-friendly tutorial.
Old-school gaming emulator
Gaming emulators are a legal gray area, but there’s no doubt that using the Raspberry Pi as a butt-kicking console emulator is a popular use for the machines. It can play games from a wide variety of consoles right on up to the PlayStation 1 era if you manage to snag some legal game ROMs, though the older the system being emulated, the better the performance.
Curious? Check out PCWorld’s complete guide to turning your Raspberry Pi into a retro gaming console for the full scoop.
A music streaming machine
The Raspberry Pi’s media chops aren’t limited to video streaming alone. Numerous operating systems have also been released that transform the device into a high-fidelity music player when connected to a speaker, sort of like a more powerful, flexible version of Chromecast Audio.
The various music-oriented OSes available offer different features; poke around the FAQs and features of each to see which is right for your needs. Here are tutorials on how to have your Raspberry Pi turn dumb speakers into smart music solutions with Volumio and Rune Audio (pictured), both of which offer mobile apps so you can control your tunes with your phone.
Learn programming
You could always use the Raspberry Pi as it was originally intended, too: As a low-cost introduction to programming and computer science. The mini-PC’s loaded with all sorts of software that encourages deep-level tinkering.
Beyond the command-line terminal, you’ll need to wade in often, you’ll also find versions of Wolfram Mathematica, Python program creation tools, and Scratch, an animation coding IDE for kids, in the Raspbian operating system that the Raspberry Pi Foundation encourages new users to install. Get smart!
Play Minecraft
Or you could play Minecraft. There’s a free Raspberry Pi version of Minecraft that anybody can download at no cost. Even better, it’s designed to teach you how to use the Python programming language as you build out the world. (Hey, Microsoft CEO Satya Nadella did say that part of the reason the company purchased Mojang was to lure kids into computer science.)
Download Minecraft: Pi Edition and jump in.
Affordable productivity PC
With options of 2GB, 4GB, and now 8GB models, the Raspberry Pi 4 packs a heftier punch than previous RPi iterations—making it suitable for basic everyday tasks like web browsing, watching video streams, and document editing. Setting up one as a PC goes fast, too, with the bulk of the hour setup time devoted to waiting for the operating system installation to complete.
As a starter or secondary computer, it’s hard to beat, especially given its build cost of $100 (or even less, if you opt for the 2GB version and not the 4GB). Check out PCWorld’s full guide in how to put together a $100 Raspberry Pi PC for everything you’ll need.
Crazy awesome experiments
Let’s finish where we began. Once you’ve wrapped your head around the Raspberry Pi’s potential, why not try your hand at one of those awe-inspiring inventive projects? PCWorld’s look at 10 insanely innovative, incredibly cool Raspberry Pi creations can help with the inspiration, while the project guides at Instructables, Hackaday, and the Raspberry Pi Foundation website itself are ready to walk you step-by-step through the really awesome stuff like the magic mirror above.
Also check out our roundup of the best Raspberry Pi kits. Whether you’re a newbie who just wants to get all the basics with one purchase, or an experienced tinkerer looking to build a specialized project, a kit could be the way to go.
Editor’s note: This article is updated periodically to include new info, most recently to resurface these projects for Pi day (March 14, 2024) and note the release of the Raspberry Pi 5. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 15 Mar (PC World)I’m a smart home expert. Writing about smart home technology, smart devices, and voice assistants is my job. Yet, I don’t remember the last time I actually spoke with Alexa.
Just to be clear, I don’t mean to pick on Alexa per se. I rarely speak to Google Assistant or Apple’s Siri, either. The reason? It’s way easier to haul out my phone and use an app than it is to get a supposedly “smart” voice assistant to do what I want.
As it stands, there’s a Google Nest Hub Max sitting in our kitchen that acts as a glorified photo frame, and it occasionally interrupts with a random answer to a question nobody asked. A few HomePod minis are scattered around our home, but they’re really just for playing music (which I mainly control on my iPhone). And a lone Alexa speaker in our daughter’s room is merely an alarm clock.
Now Amazon is promising a grand rebirth for Alexa. Slated to roll out as a public preview later this month, Alexa+ will harness the power of generative AI to hold flowing conversations, understand our intentions, take actions on our behalf, and—hopefully—be so helpful that we’ll keep our phones in our pockets.
Alexa+ will be free during its preview period, and it will remain free for Amazon Prime members; non-Prime folks will need to cough up $19.99 a month for Alexa+ access, equivalent to the entry-level subscription tiers for ChatGPT, Gemini, and Anthropic’s Claude (the latter of which is among Alexa+’s under-the-hood LLM models).
But cost was never the issue with Alexa (the “classic” Alexa will remain free for everyone, by the way). Instead, it was that Alexa became more annoying than useful.
Here’s what the new AI Alexa needs to do to get us back on speaking terms.
Make it easy to control my smart home devices
Getting the old Alexa to reliably control anything in my smart home is a royal pain. Unless I know the exact name of the device, the name of the room it’s in, and the precise command for making it do what I want it to do, Alexa will frequently come back with “Sorry, I don’t understand” or the equivalent. (Again, Google Assistant and Siri are guilty of this, too.)
As a result, I don’t ask Alexa or any of my other smart speakers to adjust my lights, turn fans on, or switch the TV to the correct input. Instead, I use my phone.
What I want from the new Alexa is simple: to get what I mean when I say, “turn the lights up in here” or “turn on the TV,” and not just because I’ve hard-coded those phrases in an Alexa routine. I want Alexa+ to intuit my intentions—and if it can’t, to ask clear follow-up questions that don’t require me to fall back into “Alexa-speak.”
Amazon is promising this exact type of smart home performance with Alexa+, and if it delivers, I might start using Alexa to control my smart gadgets again.
Make playing tunes a breeze
We use our HomePod mini speakers for music on a daily basis, teeing up tracks by Steely Dan, Miles Davis, and (more often than not) Taylor Swift. But my family struggles to get Siri to play the right tunes (“No, play the album called Lover, not the song”), so I generally queue playlists using my phone. It’s just easier than arguing with a voice assistant.
The same goes for Alexa, which is partly why there’s only one Echo speaker left in our house (the others are in a cardboard box somewhere.) But what if Alexa+ could make it easier to ask for music rather than searching for it on an app? What if we could just say, “Alexa, play that song from The Hills” and it would know we meant “Unwritten” by Natasha Bendingfield? (That’s an actual question that came up the other night—and naturally, Siri played “The Hills” by the Weeknd instead.)
If Alexa+ could really make it easier to play the music we want, and where we want (don’t get me started about trying to get Alexa or Siri to move tunes from one room to another), then our exiled Echo speakers might come out of hiding to replace our HomePods.
Be truly helpful in the kitchen
Yes, Alexa can display recipes on an Echo Show display (Google Assistant can do something similar on a Nest Hub screen), but more often than not, I just print out the recipe for whatever I’m cooking and bring it to the kitchen. It’s just easier. Put another way, Alexa has never played a meaningful role as a cook’s companion, or at least not for me.
Now, I have had success using ChatGPT to help in the kitchen (“What can I substitute for sesame oil?”). but that requires pulling out a phone when I have sticky or raw-meat hands. I would really love the ability to say “Hey Alexa, I need a quick recipe for a vinaigrette dressing, can you whip one up for me? Give me the steps one at a time, and I don’t have red wine vinegar, but I do have mustard, olive oil, and balsamic,” and Alexa would just talk me through it.
Again, Amazon demonstrated this very capability during its Alexa+ presentation last month, even going further to show how Alexa could order groceries with a partnered retailer like Whole Foods. But to just have a conversation with Alexa about general cooking questions (“what’s the safe internal temperature for pork?”) without it saying “I don’t know the answer, but I can show you search results from the web” would be a major win. Heck, I might even leave my printer alone the next time I’m about to cook.
Answer my random questions
We’re a family with lots of questions about, well, everything (it’s the byproduct of having a 13-year-old daughter), but I always groan when someone asks, for example, “Alexa, what’s something cool to do in Baltimore?” Why? Because Alexa won’t know, or it will come up with a random answer, and then someone will inevitably tell Alexa to “shut up,” and it won’t, and then things get ugly.
A more conversational Alexa+ could help keep such random questions from devolving into shouting matches, with the ability to go back and forth, ask follow-ups for clarity, and deliver organized responses that are actually relevant and interesting. The advanced voice modes for the ChatGPT and Google Gemini apps can already do this, and summoning Alexa+ on an Echo speaker for such general questions would be even easier.
Of course, if Alexa+ could go ahead and do something based on our conversation—say, book one of those interesting activities it found in Baltimore—we’d really have something. And that leads me to my next point…
Take action on my behalf
One of the big points Amazon made during its big Alexa+ reveal is that unlike ChatGPT and Gemini, the new Alexa won’t just be stuck in a chatbox. Instead, it will actually be able to do things for you.
An example demonstrated during Amazon’s event was how Alexa+ could help find a nearby carpet cleaner who uses organic materials, book an appointment, and put it in your calendar. Done and done.
Here’s another example from real life: I’m using ChatGPT to help me find affordable real estate in New York City. (Cue the laughter.) But while ChatGPT has been reasonably effective at zeroing in on listings that fit our criteria, it’s useless when it comes to proactively scouting for and notifying me about new properties on the market, and it can’t do squat about booking viewings.
But if I could have a daily chat with Alexa+ about my real estate ambitions, or if it could chime in when it learns of an enticing open house and put it on my calendar, or even fill in a real estate agent’s web form, that would be cool.
Amazon has been touting Alexa+’s skills as an AI agent, and it can supposedly fill in web forms on its own, so the kind of functionality I’m talking about here is theoretically possible. I’m eager to see it in practice.
Stop interrupting me
How many times has Alexa, or Google Assistant, or Siri just started talking out of nowhere? Sometimes I’ll just be sitting in the kitchen and I’ll hear Alexa nattering away in my daughter’s empty bedroom, or Siri will jump in with an “mmm hmm?” because it thought it heard someone say “Siri.”
Part of the reason we tucked away most of our Alexa speakers (and I’m tempted to mute the microphones on our remaining Google Assistant and Siri devices) is that they’re constantly talking out of turn, butting in on conversations, and replying to phantom queries.
What I’m hoping is that the new AI Alexa is smart enough not to jump in every time it thinks it hears the “Alexa” wake word—or if it does accidentally speak up, that it gracefully cedes the floor when we say, “Not talking to you, Alexa.” Read...Newslink ©2025 to PC World |  |
|  |  |
|
 |
 | Top Stories |

RUGBY
Blues number eight Hoskins Sotutu is putting any All Blacks test aspirations on hold as he prioritises reviving his Super Rugby side's one-win-five-loss start to the season More...
|

BUSINESS
Seventy jobs have been axed and 16 stores closed - as the Body Shop NZ goes into liquidation More...
|

|

 | Today's News |

 | News Search |
|
 |