Vue lecture

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.

Le bidule d'OpenAI est-il un stylo ?

Tour d’horizon de nouvelles approches comme Stereworld pour la 3D, Avatar Forcing pour l’animation d’avatars et DeepThinker pour le raisonnement visuel. Point également sur la stratégie de Microsoft autour de Windows 11, le durcissement des régulations de l’IA en Chine et les tensions persistantes sur le marché des semi-conducteurs. Réflexion sur l’impact des écrans sur le développement cognitif des jeunes enfants et, plus largement, sur les effets de ces technologies dans la société. On observe aussi ce que pourrait être le projet d'appareil avec IA que prépare OpenAI.

❤️ Patreon
📺 YouTube
💬 Discord

Modèles IA de la semaine

C’est déjà demain

Participants

  • Une émission préparée par Guillaume Poggiaspalla
  • Présenté par Guillaume Vendé

Hébergé par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.

💾

What is Microsoft Copilot Studio? Automate with natural language in Microsoft 365 and Microsoft Teams

Microsoft Copilot Studio is a low-code platform that lets you build, customize, and manage AI agents without extensive programming knowledge. The platform provides a graphical interface for creating intelligent agents in natural language that handle conversations and automate tasks across Microsoft Teams, Microsoft 365 Copilot, websites, mobile apps, and third-party platforms such as Facebook or Slack. To ground agents, you can integrate your organization's data sources. Recent updates have introduced enhanced AI models, improved authoring experiences, and new governance capabilities, making the platform more accessible and secure.

Source

Comment auditer les apps mobiles qui vous traquent sans votre consentement

Si vous avez installé une app récemment, vous avez surement remarqué le petit popup RGPD qui vous demande votre consentement pour les cookies et le tracking. Vous cliquez évidemment sur "Refuser" en vous disant que c'est réglé... Ben en fait... non.

Des chercheurs ont passé au crible 400 applications mobiles populaires (200 sur Android, 200 sur iOS) et résultat, 100% d'entre elles violent au moins une exigence du RGPD. Et près de la moitié de ces apps continuent à contacter des trackers MÊME APRÈS que vous ayez dit non.

Sympa le "consentement" !

Du coup, plutôt que de vous laisser vous faire gauler par ces mouchards, je vous propose un petit guide pour auditer vous-même les apps que vous utilisez. Sans vous prendre la tête, promis.

Ce qu'il vous faut

  • Un téléphone Android (iOS, c'est plus compliqué, Apple verrouille tout)
  • TrackerControl , l'outil d'audit qu'on va utiliser
  • 10 minutes de votre temps
  • L'option "Sources inconnues" activée dans les paramètres sécurité d'Android (l'app n'est pas sur le Play Store...)

Étape 1 : Installer TrackerControl

TrackerControl est donc un outil open source développé par des chercheurs. La bestiole analyse le trafic réseau de chaque app pour détecter les connexions vers des serveurs de tracking.

Rendez-vous sur le GitHub du projet et téléchargez l'APK. Installez-le en autorisant temporairement les sources inconnues.

Étape 2 : Lancer l'audit

Une fois installé, TrackerControl se comporte comme un VPN local (vos données ne sortent pas de votre téléphone, rassurez-vous). Activez-le et lancez l'app que vous voulez auditer.

L'outil va alors intercepter toutes les connexions sortantes et les classer : publicité, analytics, tracking social, fingerprinting... Y'a de quoi faire le tri !

L'interface de TrackerControl - sobre mais efficace ( Source )

Étape 3 : Interpréter les résultats

Ce qu'il faut surveiller :

  • Connexions AVANT toute action : Si l'app contacte des trackers dès son lancement, avant même que vous ayez vu un popup de consentement, c'est une violation du critère "Prior consent"
  • Connexions APRÈS refus : Relancez l'app après avoir refusé le tracking. Si des connexions partent quand même vers Google Analytics, Facebook ou autres... bingo !
  • Le nombre de domaines contactés : Une app de lampe torche qui contacte 15 serveurs différents, c'est suspect (oui ça existe)

Détail des trackers détectés - on voit tout ce qui sort ( Source )

Les 6 critères RGPD que les apps violent

L'étude suivante a identifié six types de violations :

  • Prior : L'app collecte VOS données avant de vous demander votre avis
  • Informed : On vous dit pas vraiment ce qu'on fait avec vos données
  • Freely-given : Pas le choix, c'est "accepte ou dégage"
  • Specific : Le consentement est trop vague, genre "améliorer nos services"
  • Unambiguous : L'interface est conçue pour vous faire cliquer sur "Accepter"
  • Revocable : Vous dites non, mais ça continue quand même (près de la moitié des apps)

C'est flippant, non ? Comme je vous l'expliquais dans mon article sur le mythe du smartphone espion , le vrai problème n'est pas le micro qui vous écoute... c'est ce réseau de data brokers qui aspire tout ce qu'ils peuvent.

Dépannage

Et si TrackerControl ne détecte rien, vérifiez que le "VPN" est bien actif (icône de clé dans la barre de notifications). Certaines apps détectent les VPN et changent leur comportement, du coup relancez plusieurs fois pour être sûr.

Pour aller plus loin dans la protection de vos données, j'ai publié également ce guide sur la suppression de vos données personnelles qui vous donnera quelques pistes.

Voilà, maintenant vous avez les outils pour aller à la pêche aux trackers. De quoi regarder vos apps d'un autre œil, j'imagine !

Source

Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations

Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan. The activity has been attributed to APT28 (aka BlueDelta), which was attributed to a "sustained"

Gl.iNet Beryl 7 WiFi 7 Travel Router Revealed

The Beryl 7 from Gl.iNet Finally Revealed

On January 6, 2026, day 1 of CES 2026, Gl.iNet is highlighting the Beryl 7 (GL-MT3600BE) as an upcoming travel router positioned below the company’s more premium Slate 7 in the same Wi-Fi 7 travel category. The device is being presented as a successor direction to the earlier Beryl AX generation, with Gl.iNet focusing its messaging on VPN throughput, portable use, and the practical ports and power features that matter when the router is used on the road. Pricing and a firm release date have not been included in the information shared so far.

In its CES materials, Gl.iNet describes Beryl 7 as a compact, dual-band Wi-Fi 7 model aimed at users who want higher encrypted throughput without stepping up to a larger, more feature-heavy travel router. Key claims include up to 1100Mbps on OpenVPN-DCO and WireGuard, dual 2.5G Ethernet capability, and support for 120+ connected devices, alongside USB Power Delivery compatibility and a 5V/2A power output intended to integrate cleanly with uFi and MiFi devices for primary or backup WAN use.

Item Detail
Product name Gl.iNet Beryl 7
Model GL-MT3600BE
Wi-Fi Dual-band Wi-Fi 7
Frequency 2.4GHz, 5GHz
Wi-Fi speeds 688Mbps (2.4GHz), 2882Mbps (5GHz)
Wireless protocols 802.11a/b/g/n/ac/ax/be
CPU MediaTek, quad-core @ 2.0GHz
Memory 512MB DDR4
Flash 512MB NAND
VPN performance claim Up to 1100Mbps on OpenVPN-DCO and WireGuard
Ethernet 1x WAN, 1x LAN
Ethernet speed 100/1000/2500Mbps
USB 1x USB 3.0
Power input USB PD 5V/3A, 9V/3A, 12V/2.5A
Power consumption <12W
Power output 5V/2A
Dimensions / weight 120 x 83 x 34mm / 205g
Operating temperature 0C to 40C
Built-in battery None (USB-C powered)
SIM / eSIM None (no SIM or eSIM Support)

Gl.iNet Beryl 7 Travel Router – Design & Portability

The Beryl 7 measures at 120 x 83 x 34mm and 205 grams, placing it in the small-router class rather than the pocket-hotspot style. Compared with battery-powered travel routers, the added thickness is consistent with a design that prioritizes full-size ports and airflow while still staying compact enough for a backpack or a small tech pouch. Gl.iNet also lists an operating temperature range of 0C to 40C, which sets basic expectations for typical indoor and travel use, even though performance under sustained load will still depend on ventilation and ambient conditions.

Unlike cellular travel routers, the Beryl 7 is designed to be powered externally rather than running from an internal battery, so it is closer in use to a small plug-in router than a self-contained hotspot. It takes USB-C power via USB Power Delivery and is specified for 5V/3A, 9V/3A, or 12V/2.5A input, which keeps powering simple with common phone and laptop adapters and most power banks that support PD. Gl.iNet also lists a 5V/2A power output, intended to pair with uFi and MiFi devices when you want the router to sit in front of a separate upstream connection and keep that upstream device powered from the same setup.

Gl.iNet Beryl 7 Travel Router – Connectivity

The Beryl 7 is a dual-band Wi-Fi travel router rather than a cellular router. It does not include a SIM slot or eSIM support, which means it is not designed to connect directly to a carrier network on its own. In practice, internet access is expected to come from an upstream source such as a wired connection, USB tethering, or an external hotspot or modem that provides the WAN link. This approach matches travel setups where the router’s job is to manage your local network and security policies, while a separate device handles mobile connectivity when needed.

On the wireless side, the Beryl 7 supports 802.11a/b/g/n/ac/ax/be and operates on 2.4GHz and 5GHz. The published maximum rates are 688Mbps on 2.4GHz and 2882Mbps on 5GHz, which sets its theoretical peak figures for those bands. Because there is no 6GHz band listed, it will not have access to the cleaner spectrum that some tri-band Wi-Fi 7 routers use to reduce congestion in dense environments. Real-world performance will still depend heavily on client device capability, channel conditions, and how crowded the local RF environment is, especially in hotels, apartments, or event venues.

For wired networking, the Beryl 7 includes 1x WAN and 1x LAN, with both ports rated at 100/1000/2500Mbps. Having 2.5Gbps capability on both sides can matter if you are connecting to faster-than-gigabit service, or if you want to avoid bottlenecking a wired client such as a laptop dock, mini PC, or NAS while the router is also handling wireless clients. The dedicated WAN and LAN labeling also suggests a straightforward topology for travel use, where the router can sit between a wired uplink and your personal devices without requiring additional switches. Specific options like port re-assignment or multi-WAN behavior are still dependent on the final firmware feature set.

For tethering and peripherals, the router includes 1 USB 3.0 port. Gl.iNet’s positioning also references pairing it with uFi and MiFi devices for primary or backup WAN use, which aligns with common travel workflows where a hotspot provides the upstream connection and the router distributes it to multiple devices. Depending on software support, USB can also be relevant for other functions such as attaching storage for basic file sharing, but those capabilities are not confirmed solely by the presence of the port. The practical takeaway is that the Beryl 7’s connectivity design focuses on managing and distributing an external internet source rather than replacing that source with built-in cellular hardware.

Gl.iNet Beryl 7 Travel Router – Internal Hardware

The Beryl 7 is specified with a MediaTek quad-core CPU clocked at 2.0GHz. Gl.iNet has not stated the exact chipset model in the material provided, so it is difficult to compare directly against specific MediaTek families used in other routers, but the listed clock speed and core count indicate it is intended to handle routing and VPN workloads beyond basic hotspot sharing. How that translates in practice will depend on the final firmware feature mix and how much processing overhead is added by enabled services. Memory is listed as 512MB of DDR4. That capacity is typically sufficient for a travel router doing standard routing, firewalling, and VPN duties, but it can become a limiting factor if heavy logging, multiple concurrent services, or more advanced packages are enabled. In practical use, headroom will depend on how Gl.iNet tunes the stock firmware and whether the router is expected to run additional features beyond its default configuration. Storage is specified as 512MB of NAND flash. This is a smaller onboard footprint than some higher-end travel routers that use multi-gigabyte eMMC, and it generally implies a tighter space budget for the base firmware image, installed packages, and retained logs. It also means features that rely on persistent local storage may be more constrained unless Gl.iNet provides options to offload data to external storage via USB.

Gl.iNet Beryl 7 Travel Router – Software & Services

Gl.iNet is presenting the Beryl 7 as part of its travel router lineup, which typically uses the company’s GL.iNet firmware with a web-based management interface. That software approach tends to balance simplified setup for common tasks with access to more detailed configuration when needed, which is relevant for travel scenarios where you may want quick changes without digging through advanced menus.

For this model in particular, VPN is the main emphasis in Gl.iNet’s CES messaging. The company is making a specific performance claim of up to 1100Mbps on OpenVPN-DCO and WireGuard, positioning encrypted throughput as a headline reason to choose the Beryl 7 over older Beryl models or lower-end travel routers. Actual results will still depend on factors such as upstream bandwidth, server performance, encryption settings, and network conditions.

Gl.iNet also highlights Amnezia VPN support as part of the Beryl 7’s privacy and censorship-bypass positioning. That places the router within the company’s broader direction of expanding VPN tooling and privacy-related options across its travel lineup, though the exact implementation details for the Beryl 7 will come down to the shipping firmware and how features are exposed in the final interface.

Beyond VPN-related claims, Gl.iNet has not published a complete, model-specific list of software functions for the Beryl 7. Features that appear across other Gl.iNet travel routers, such as traffic controls, DNS and filtering options, remote access services, and package-style add-ons, may be present, but they are not confirmed by the hardware spec sheet alone. For ownership considerations, the missing pieces remain the update cadence, support window, and any limitations imposed by the device’s relatively small flash storage.

Gl.iNet Beryl 7 Travel Router – Conclusion

As presented on day 1 of CES 2026, the Beryl 7 (GL-MT3600BE) is positioned as a more affordable Wi-Fi 7 travel router option that sits below the Slate 7 in capability and likely in price, while serving as the next step after the Beryl AX generation. Its core proposition is a compact, USB-C powered router that focuses on high VPN throughput, dual-band Wi-Fi, and practical wired networking for travel setups. The specification sheet outlines a MediaTek quad-core 2.0GHz platform with 512MB DDR4 and 512MB NAND, paired with 2.5Gbps-capable WAN and LAN ports, plus a USB 3.0 port. It does not include an internal battery and it has no SIM or eSIM support, which means it is designed to sit behind an external internet source such as hotel Ethernet, phone tethering, or a dedicated hotspot. Power is handled through USB Power Delivery, and Gl.iNet also lists a 5V/2A output intended to keep an upstream mobile device powered in a single-cable travel arrangement.

The remaining unknowns are mostly around launch details and how the final firmware is packaged for a device with limited flash storage. Gl.iNet has not published pricing or a release date, and it has not provided a full, model-specific breakdown of software features beyond its VPN and privacy positioning. Those details will likely matter most to buyers deciding between the Beryl 7 and higher-end travel routers, especially if they plan to rely on add-on services, extensive logging, or other features that place more demand on storage and memory.

 

📧 SUBSCRIBE TO OUR NEWSLETTER 🔔
[contact-form-7]
🔒 Join Inner Circle


Get an alert every time something gets added to this specific article!


Want to follow specific category? 📧 Subscribe

This description contains links to Amazon. These links will take you to some of the products mentioned in today's content. As an Amazon Associate, I earn from qualifying purchases. Visit the NASCompares Deal Finder to find the best place to buy this device in your region, based on Service, Support and Reputation - Just Search for your NAS Drive in the Box Below

Need Advice on Data Storage from an Expert?

Finally, for free advice about your setup, just leave a message in the comments below here at NASCompares.com and we will get back to you. Need Help? Where possible (and where appropriate) please provide as much information about your requirements, as then I can arrange the best answer and solution to your needs. Do not worry about your e-mail address being required, it will NOT be used in a mailing list and will NOT be used in any way other than to respond to your enquiry. [contact-form-7] TRY CHAT Terms and Conditions
If you like this service, please consider supporting us. We use affiliate links on the blog allowing NAScompares information and advice service to be free of charge to you.Anything you purchase on the day you click on our links will generate a small commission which isused to run the website. Here is a link for Amazon and B&H.You can also get me a ☕ Ko-fi or old school Paypal. Thanks!To find out more about how to support this advice service check HEREIf you need to fix or configure a NAS, check Fiver Have you thought about helping others with your knowledge? Find Instructions Here  
 
Or support us by using our affiliate links on Amazon UK and Amazon US
    
 
Alternatively, why not ask me on the ASK NASCompares forum, by clicking the button below. This is a community hub that serves as a place that I can answer your question, chew the fat, share new release information and even get corrections posted. I will always get around to answering ALL queries, but as a one-man operation, I cannot promise speed! So by sharing your query in the ASK NASCompares section below, you can get a better range of solutions and suggestions, alongside my own.

☕ WE LOVE COFFEE ☕

 

 

Where to Buy a Product
amzamexmaestrovisamaster 24Hfree delreturn VISIT RETAILER ➤ 
amzamexmaestrovisamaster 24Hfree delreturn VISIT RETAILER ➤

If you like this service, please consider supporting us.
We use affiliate links on the blog allowing NAScompares information and advice service to be free of charge to you. Anything you purchase on the day you click on our links will generate a small commission which is used to run the website. Here is a link for Amazon and B&H. You can also get me a ☕ Ko-fi or old school Paypal. Thanks! To find out more about how to support this advice service check HERE    

☕ WE LOVE COFFEE ☕

Or support us by using our affiliate links on Amazon UK and Amazon US
     

Le NO FAKES Act veut réguler les deepfakes, mais c'est surtout l'open source qui va trinquer

Après le DMCA, après la DADVSI , après SOPA, après PIPA, après EARN IT... voici le NO FAKES Act ! Bref, un nouveau projet de loi américain pondu par des gens qui visiblement n'ont jamais lancé un git clone de leur vie.

Le texte ( S.1367, 119e Congrès , introduit en avril 2025) part d'une intention louable qui est de protéger les gens contre les deepfakes non consentis. Vous savez, ces vidéos truquées où votre tête se retrouve sur un corps qui n'est pas le vôtre, de préférence à poil...

Mais comme toujours, l'enfer est pavé de bonnes intentions et la méthode choisie va potentiellement atomiser tout l'écosystème de l'IA open source.

En fait, une large partie des services qui hébergent du contenu généré par les utilisateurs devront mettre en place une logique de notice-and-staydown basée sur du "digital fingerprinting" afin de pouvoir retirer le contenu signalé et empêcher que les mêmes œuvres réapparaissent après notification. De quoi faire pleurer donc n'importe quel admin sys qui a déjà dû gérer un serveur de modération.

Et là où ça se corse c'est que contrairement au DMCA et ses exceptions , ce texte ne prévoit pas de véritable mécanisme de contre-notification façon DMCA. Quelqu'un signale votre contenu comme étant un deepfake ? Hop, c'est retiré. Vous pensez que c'est une erreur ? La seule voie prévue pour espérer une remise en ligne passe par une action en justice (sous 14 jours) contre l'expéditeur de la notification. Alors direction le tribunal fédéral, les amis...

Et les coûts de conformité estimés par la CCIA donnent le vertige car en moyenne, ça devrait tourner à environ 1,64 million de dollars la première année pour une simple startup. Et je ne parle même pas des projets open source qui distribuent des modèles d'IA générative... Comment Stable Diffusion ou Whisper pourraient-ils implémenter du fingerprinting sur des modèles que n'importe qui peut télécharger et faire tourner localement ? Mystère et boule de gomme !

Le truc bien moche, c'est que le texte prévoit des dommages et intérêts pouvant grimper jusqu'à 750 000 dollars par œuvre pour les plateformes non conformes. Autrement dit, si une plateforme ne réagit pas correctement après notification, elle peut devenir bien plus exposée à ce que font ses utilisateurs avec des outils d'IA... Voilà donc de quoi sérieusement refroidir les ardeurs de quiconque voudrait partager un petit modèle open weights.

Dans un autre style, ça me rappelle l'affaire youtube-dl où le DMCA avait été utilisé pour faire retirer un outil open source de GitHub sauf que là, on passe à l'échelle supérieure.

Voilà donc encore un lance-flammes législatif imaginé pour tuer une mouche et malheureusement, l'open source risque d'être le dommage collatéral de ce texte mal calibré.

Voilà les amis... l'avenir de l'IA ouverte pourrait bien se jouer dans les mois qui viennent aux US, et ça, ça va faire mal.

Source

❌