Verification: 0d460fb81828e89b
Connect with us


Nobody bothers to read the ‘terms of use’ of the software. This ‘terrible ideas’ challenge may not change that… but we laughed

A few weeks ago we were talking about an initiative that had taken place 6 years ago on Reddit, in which users of a humor forum for programmers they had challenged each other to create ‘the worst interface in the world’at least with regard to controlling the audio of our equipment.

Because even the worst ideas require imagination to carry them out. The idea was too good to leave it there, and now someone has applied it to the design of the acceptance of terms and conditions of service for software and websites.

About stupid ideas

But before we tell you about it, we are going to talk to you about the event that made it possible.

We call a “hackathon” that social event in which developers meet for a short period of time (usually 1-2 days) to create a project, such as an application or a hardware device. A “stupid shit hackathon” (something like ‘stupid shit hackathon’) is that event in which people come together to

“creating projects that are terrible, useless, and probably should never have seen the light of day. There are no prizes and definitely no winners. It’s really fun.”

The definition we have just cited is the work of the organizers of the ‘Boston Stupid Shit No One Needs & Terrible Ideas Hackathon’, an event that has been organized since 2017 in Boston (USA), and which is responsible for today we bring you this news.

“Coders, designers, hackers, and techies from Boston and beyond. Feel like creating something that’s cool, but has absolutely no value? Come alone or with friends, ideas or not, we’ll make sure your experience is as stupid as possible”.

About the challenge

Why specifically choose the topic of terms of service as a challenge? Well, neither their website nor their social profiles explain it, but, like the Reddit challenge that we mentioned before, The truth is that it allows us to reflect on concepts such as ‘usability’ and ‘interaction design’.

Or maybe it’s just one good excuse to make the coffee. Who knows.

The terms of service (also known as terms of use, terms and conditions policy, license terms, etc.) is a document that informs users of what is legally required of them when they first use a digital product (either a program, a desktop app or a web service).


The Windows Use License Terms


They are usually something that we accept automatically without trying to read it: after all, they are often lengthy and horrifyingly boring legalese documents… but that sometimes causes unpleasant surprises later.

It is not always possible to settle everything with one click on ‘OK’: Sometimes applications won’t allow you to scroll through the screen if you don’t scroll through the entire document first. But the participants of this hackathon have had even more convoluted ideas to complicate our lives when it comes to accepting and/or consulting the terms of use.

‘stupid designs’

Daniel Glus, with his ‘No scrolling allowed’ project, offers the exact opposite of the previous example: the impossibility of scrolling to accept the terms. Or rather, convert the scroll into an automatic reduction of the text that prevents reading its content.

‘Commute’, by Geoffrey Litt, does force us to scroll through the entire text… but turning the process into a car video game with a level crossing and everything.

And again, with ‘Red Green’, by Jordan Butts, transport metaphors applied to this field, now with the use of traffic lights to move through the text. If the light is red, nothing to scroll or click ‘Okay’.

‘Spinner’” by Ethan Schondorf, It makes it difficult for us to click ‘Accept’, or rather leaves it to chance, turning it into a ‘Ferris wheel’. Other of his projects are ‘Runaway’, in which we have to hunt for the ‘OK’ button all over the screen, and ’66’, in which we have to press ‘OK’ that many times.

Finally, an idea from Geoffrey Litt that is not at all silly, and could actually be helpful in convincing people to read the terms of use… mimic the opening presentation of ‘Star Wars’:

Image | Evgenia at Pixabay + Nick Youngson CC BY-SA 3.0 Pix4free

In Genbeta | Renfe had a mission: to make the ticket machines easier to use. And it has ended up making them much more complicated

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


This open-source tool allows you to scale any image and video for free with AI: this is how Video2X works

if what you are looking for a free and easy to use tool for scaling images and videos, you have come to the right place. And it is that the app that we are going to talk about next is open source and it makes use of your computer’s hardware to increase the resolution of any image or video, very useful for those occasions in which we have photos or videos of better quality.

Video2X makes use of the capabilities of our graphics card to scale images and videos in poor quality. Besides, supports multiple formats, so it will be very useful to also scale GIFs or videos in MP4, MKV and more formats. Under these lines we show you how it works.

A free tool to scale images and videos

To use this tool, all you have to do is go to its official Github page and download its latest version. Once the ZIP file is obtained, we unzip and we will have a folder with two executable files and other dependencies. In our case we will choose the file ‘video2x_gui.exe‘, since it has a graphical interface to proceed with the scaling.

If you look closely, you will find a lot of options. However, the tool works without applying any initial configuration. Just select the file from your computer via the ‘Select File’ option and then select the output path of the file from the ‘Output’ section. You can also modify the output name in the bottom text box.

After having configured the previous steps, we select ‘Start’ and the process will start automatically. You should know that the scaling process will be long, especially for videos, since it makes use of our graphics card for it. Even if you have a decent graphics card (in our case we used an RTX 3080), depending on the size of the video it could take several hours.

To testify to the qualities of this tool, its creators have uploaded several videos on YouTube that show the quality of the scaling, like this trailer for ‘Spirited Away’, which goes from 360p to 4K.

spirited away

To scale the files, Video2X makes use of various techniques and algorithms. Through its documentation we can obtain information about which technique to use when scaling a file. For example, if we use ‘Anime4K’, the process will be faster than if we select ‘Waifu2x’, although the quality will be lower. However, if we use ‘realsr-ncnn-vulkan’, the process will be extremely slow, but the quality will be much better.

This powerful AI can restore any photo for free and scale its resolution: that's how it works


The techniques described above rely on frame interpolation processes, machine learning and artificial intelligence, which is why good hardware is required to complete the scaling efficiently. However, in case we do not have a decent graphics card, we can always make use of Google Colab and use a powerful graphics through the cloud to carry out the process.

Although we have mentioned before that the tool works without the need to enter the configuration section at any time, it is worth taking a look at all the options, since we will find sections to modify the level of noise applied, the size, quality and cropping of the file and much more. These options can be modified for each driver used.

In Genbeta | This tool allows us to automatically update all our Windows 10 and 11 apps: the best thing is that it is open-source and free

Continue Reading


This app beeps every time your browser sends data to Google. And it’s non-stop

Bert Hubert —developer, creator of PowerDNS and online privacy activist— has presented an application with which he intends to show how much data our computer sends to Google throughout a browsing session. And, so that we keep it in mind at all times, and we can relate what kind of actions trigger said shipments, alerts us by beeping every time this happens.


Continue Reading


That e-mail that has come to you asking for a quote is the first step in a cyberattack

The Central Information Security Brigade of the National Police has issued an alert about a recent wave of cyberattacks directed against Spanish architecture companies (but which “may expand to other sectors in the future”) through a ransomware campaign that they describe as “of high sophistication”.

This attack, which resorts to spoofing, is using Scam emails posing as Fotoprix companya well-known photographic company.

Cyber ​​criminals send messages from a fake domain, “”, requesting budgets for reforms in their facilities. The sophistication of this strategy lies in the fact that the messages are extremely consistent and appear to be legitimate, which reduces the suspicions of the victims.

After several email exchanges, the attackers propose to set up a meeting to finalize the budget. However, before the meeting, they send the victims an attachment containing details about the alleged reform.

By downloading and running this file In their systems, company terminals are automatically encrypted, leaving victims without access to their files and data.

Once the files are encrypted, cybercriminals demand a rescue to unlock the data. Instructions for making the ransom payment are included in a text file that is copied to affected systems.

This extortion tactic is characteristic of other ransomware attacks, where attackers seek financial gain in exchange for restoring access to victims’ files.

The high level of sophistication of the campaign makes it difficult for victims to suspect the hoax until they have already been affected.



Tips to consider

The Central Cybercrime Unit of the National Police continues to work to track and contain this threat, but it is essential that companies remain vigilant and take proactive measures to protect themselves against these types of increasingly sophisticated cyberattacks.

Faced with this situation, the Police have developed the following basic recommendations to avoid being a victim of these attacks:

  1. Beware of unknown emails: Do not open e-mails from unknown senders or those that have not been previously requested.
  2. Avoid suspicious downloads: Do not download email attachments from unknown senders.
  3. Keep systems up to date: Always keep the operating system and antivirus software updated to mitigate possible vulnerabilities.
  4. Make backups: Make backup copies periodically and in independent systems, so that in the event of an attack the data can be recovered without the need to accept the payment of any ransom.

Via | Ministry of the Interior

Image | Marcos Merino through AI

In Genbeta | If ransomware was not enough, now scams based on fake cyberattacks are here. They threaten to publish data they do not have

Continue Reading