Salta al contenuto principale



"Venendo qui oggi, nel luogo che l’avvocato Bartolo Longo volle consacrare alla Madonna del Rosario come casa di preghiera e di speranza per tanti, ci sentiamo avvolti da quella stessa tenerezza che Maria offrì alla casa di Elisabetta: una presenza s…



“I fenomeni straordinari che possono connotare l’esperienza mistica non sono condizioni indispensabili per riconoscere la santità di un fedele: se presenti, essi ne fortificano le virtù non come privilegi individuali, ma in quanto ordinati all’edific…



Giubileo dei poveri: Roma, sabato un incontro per raccontare la storia dell’Acisjf e presentare il libro “Maria che scende dal treno”




Leone XIV: “sviluppare e implementare politiche che proteggano la dignità dei minori nell’era dell’intelligenza artificiale”

"I minori sono particolarmente vulnerabili alla manipolazione attraverso algoritmi di intelligenza artificiale che possono influenzare le loro decisioni e preferenze.



secondo me il mandato di trump continuerà a questo modo... alternando 2 mesi di shutdown e 2 mesi di attività dello stato federale


ma non è che il problema è semplicemente rimandato a gennaio? fra 1 mese e mezzo?


Sylvia Aguilar Zéleny – Spazzatura
freezonemagazine.com/news/sylv…
In libreria dal 19 Novembre 2025 Mi chiamo Alicia e non sono qua per fare la puttana. Io non voglio fare la puttana. Sono qua perché la Bella mi ha detto che potevi aiutarmi. Vengo dalla spazzatura. Ecco perché puzzavo in quel modo. Ecco perché avevo quell’aspetto. Una storia di frontiera, quella molto […]
L'articolo Sylvia Aguilar Zéleny – Spazzatura proviene da FREE ZONE MAGAZINE.
In



Ci sono gli Emirati dietro gli eccidi e la pulizia etnica in Sudan


@Notizie dall'Italia e dal mondo
Un fitto intreccio tra interessi economici e geopolitici lega gli Emirati Arabi Uniti alle milizie che seminano il terrore e la distruzione in vaste aree del Sudan. Egitto, Arabia Saudita e Turchia provano a reagire
L'articolo Ci sono gli Emirati dietro gli eccidi e la pulizia

reshared this



L’Italia prepara la sua Arma cyber. Il piano Crosetto per la nuova Difesa

@Notizie dall'Italia e dal mondo

Nella cornice di una ridefinizione complessiva del comparto difesa italiana, il ministro Guido Crosetto, in aula alla Camera durante il Question time, ha presentato un’architettura di intervento che conferisce al cyber-dominio un ruolo centrale nella strategia nazionale.



Rhadamanthys: c’è l’ombra di un nuovo Endgame Operation


@Informatica (Italy e non Italy 😁)
Qualcuno, in queste ore, sta perdendo l’accesso ai propri server. Non per un banale errore di configurazione o per un attacco di concorrenti sleali, ma perché altri — molto probabilmente una forza di polizia internazionale — ha iniziato a bussare ai loro admin panel. Il bersaglio sembra essere



Digitaler Omnibus: „Größter Rückschritt für digitale Grundrechte in der Geschichte der EU“


netzpolitik.org/2025/digitaler…



EDRi-gram, 13 November 2025


What has the EDRi network been up to over the past few weeks? Find out the latest digital rights news in our bi-weekly newsletter. In this edition: Halloween is over… but digital rights horrors remain

The post EDRi-gram, 13 November 2025 appeared first on European Digital Rights (EDRi).



Judge grants Meta limited postponement in Bits of Freedom lawsuit


In early October, digital human rights organization Bits of Freedom took Meta to court. The organization demanded that Meta offers its users on in apps such as Instagram and Facebook the option to choose a feed that is not based on profiling. The judge ruled in favour of Bits of Freedom and ordered Meta to modify its apps within two weeks. Meta claimed that such changes were impossible to deliver in that timeframe and asked the Amsterdam Court of Appeal for a postponement. The court has now ruled that Meta will indeed be granted a postponement.

The post Judge grants Meta limited postponement in Bits of Freedom lawsuit appeared first on European Digital Rights (EDRi).

tsadilas reshared this.



Climate justice action repression vs EU data protection law: the Advocate General’s opinion


In his opinion, the Court’s Advocate General assesses the compliance of the French law regulating the collection of biometric data by police with EU data protection criteria. Although his interpretation remains strictly theoretical and fails to account for the reality of police practices in France, one of his proposals might become handy for people when seeking redress after abusive data collection.

The post Climate justice action repression vs EU data protection law: the Advocate General’s opinion appeared first on European Digital Rights (EDRi).



3D Printed Mail is a Modern Solution to an Ancient Problem


PLA mail being tested against a sword

The human body and sharp objects don’t get along very well, especially when they are being wielded with ill-intent. Since antiquity there have been various forms of armor designed to protect the wearer, but thankfully these days random sword fights don’t often break out on the street. Still, [SCREEN TESTED] wanted to test the viability of 3D printed chain mail — if not for actual combat, at least for re-enactment purposes.

He uses tough PLA to crank out a bed worth of what looks like [ZeroAlligator]’s PipeLink Chainmail Fabric, which just so happens to be the trending result on Bambu’s MakerWorld currently. The video shows several types of mail on the printer, but the test dummy only gets the one H-type pattern, which is a pity — there’s a whole realm of tests waiting to be done on different mail patterns and filament types.

In any case, the mail holds up fairly well to puncture from scissors and screwdrivers — with a heavy sweater or proper gambeson (a quilted cloth underlayer commonly worn with armor) on underneath, it looks like it could actually protect you. To slashing blows, PLA holds up astoundingly well, barely marked even by slashes from an actual sword. As for projectiles, well, everyone knows that to an arrow, chain mail is made of holes, and this PLA-based armor is no different (as you can see at 8:30 in the video below).

If you want to be really safe when the world goes Mad Max, you’d probably want actual chain mail, perhaps from stainless steel. On the other hand, if someone tries to mug you on the way home from a con, cosplay armor might actually keep you safer than one might first suspect. It’s not great armor, but it’s a great result for homemade plastic armor.

Of course you’d still be better off with Stepahnie Kwolek’s great invention, Kevlar.

youtube.com/embed/EJKMNdjISHQ?…


hackaday.com/2025/11/13/3d-pri…



Super Session: la prima vera jam session rock’nroll
freezonemagazine.com/rubriche/…
L’idea non è particolarmente originale. Due amici, musicisti disoccupati, si danno appuntamento in uno studio di registrazione a New York e iniziano a improvvisare con l’idea di avvicinarsi, improvvisando, al suono e allo stile jazz della Blue Note degli anni ’50 ma con una forte connotazione rock. Nel 1968, l’eclettico organista, chitarrista,


Installing an 84MB Hard Drive Into a PDP-11/44


A photo of some drives with their controller boards

Over on YouTube [Usagi Electric] shows us how he installed an 84MB hard drive into his PDP-11/44.

In the beginning he purchased a bunch of RA70 and RA72 drives and board sets but none of them worked. As there are no schematics it’s very difficult to figure out how they’re broken and how to troubleshoot them.

Fortunately his friend sent him an “unhealthy” Memorex 214 84MB hard drive, also known as a Fujitsu 2312. The best thing about this hard drive is that it comes complete with a 400 page manual which includes the full theory of operation and a full set of schematics. Score!

After removing the fan and popping the lid we see this Fujitsu 2312 is chock-full of 7400 series logic. For power this drive needs 24 volts at 6 amps, 5 volts at 4.5 amps, and -12 volts at 4 amps. Fitting the drive into the PDP-11 rack requires a little mechanical adjustment but after making some alterations the hard drive and a TU58 tape drive fit in their allotted 3U rack space.

After a little bit of fiddling with the drive controller board the Control Status Register (RKCS1) reads 000200, which indicates fully functional status. At this point the belief is that this computer would boot off this drive, if only it contained an operating system. The operating system for this machine is RSX11. And that, dear reader, is where we are now. Does anyone have a copy of RSX11 and a suggestion for how we get it copied onto the Fujitsu 2312? We wouldn’t want to have to toggle-in our operating system each time we boot…

youtube.com/embed/0TU3Jn3DubM?…


hackaday.com/2025/11/12/instal…



La regina delle Criptovalute è stata presa! Ha rubato 7 miliardi di dollari in Bitcoin


Un tribunale di Londra ha condannato la 47enne cinese Zhimin Qian, nota anche come Yadi Zhang, a 11 anni e 8 mesi di carcere per aver riciclato Bitcoin ottenuti attraverso il più grande schema Ponzi di investimenti in criptovalute della storia cinese. Tra il 2014 e il 2017, lo schema ha truffato oltre 128.000 persone, costando loro oltre 7,3 miliardi di dollari in criptovalute.

L’indagine internazionale, condotta dalle forze dell’ordine britanniche e cinesi, è durata sette anni e ha portato al sequestro di 61.000 bitcoin. Al momento della confisca, il loro valore è salito circa 7,3 miliardi di dollari.

Si tratta del più grande sequestro di criptovalute nella storia del Regno Unito, che ha superato persino il sequestro di oltre 94.000 bitcoin per un valore di 3,6 miliardi di dollari effettuato dal Dipartimento di Giustizia degli Stati Uniti nel 2022, in relazione all’attacco informatico a Bitfinex.

Oltre a Bitcoin, le forze dell’ordine hanno sequestrato a Zhimin Qian beni per un valore di 11 milioni di sterline (14,4 milioni di dollari), tra cui portafogli crittografici, dispositivi crittografati, denaro contante e oro.

Dal 2014 al 2017, Qian ha gestito un enorme schema Ponzi chiamato Lantian Gerui (che in cinese significa “Cielo Blu”) in Cina. L’azienda sosteneva di investire in prodotti sanitari ad alta tecnologia e di estrarre Bitcoin, e alla fine ha raccolto oltre 40 miliardi di yuan (circa 5,6 miliardi di dollari) da circa 130.000 investitori, promettendo rendimenti dal 100% al 300%. Molte vittime dello schema hanno investito tutti i loro risparmi pensionistici e altri beni nello schema.

All’epoca, Qian si guadagnò il soprannome di “Bitcoin Queen” perché promuoveva attivamente le criptovalute in generale e Bitcoin in particolare, definendole “oro digitale”.

Nel 2017, quando lo schema Ponzi fallì e attirò l’attenzione delle autorità cinesi, Qian convertì tutti i fondi ricevuti dagli “investitori” in Bitcoin e fuggì nel Regno Unito sotto falso nome, entrando nel Paese con documenti falsi.

Arrivata nel Regno Unito nel settembre 2017, Qian assunse degli assistenti e affittò una villa in un quartiere esclusivo di Londra per 17.000 sterline (circa 23.000 dollari) al mese. Viaggiò in tutta Europa e nel Sud-est asiatico, soggiornando in hotel di lusso e acquistando costosi gioielli e orologi. Tentò anche di riciclare criptovalute attraverso l’acquisto di immobili di lusso a Londra e Dubai.

Nell’ottobre 2018, le forze dell’ordine britanniche ricevettero informazioni su un tentativo di vendita di beni criminali a Londra e avviarono un’indagine. Fu allora che le autorità rintracciarono Qian e perquisirono la sua villa londinese. Tuttavia, la truffatrice viveva sotto falso nome di Yadi Zhang e, a quel punto, gli investigatori non erano a conoscenza della sua vera identità.

Dopo la perquisizione, Qian fuggì da Londra e sfuggì alla giustizia per quasi sei anni. Fu arrestata solo nel 2024 a York. Il suo assistente e complice, era stato arrestato in precedenza, nel maggio 2021, nella stessa villa e successivamente condannato a sei anni e otto mesi di carcere per favoreggiamento del riciclaggio di denaro.

Secondo quanto riportato dai media, durante la perquisizione, la polizia ha trovato il diario di Qian, in cui aveva annotato le sue “aspirazioni e intenzioni”. Ad esempio, desiderava diventare regina di Liberland, uno stato autoproclamato tra Croazia e Serbia, e sognava anche di “incontrare il Duca e i membri della famiglia reale”.

Oltre a Qian e Wen, è stato condannato un altro partecipante alla frode di 47 anni, del Derbyshire, che aiutava Qian ad affittare immobili e gestiva trasferimenti di criptovalute. Ha ricevuto una condanna a quattro anni e 11 mesi per trasferimento di beni ottenuti illegalmente (criptovalute), sebbene il suo avvocato abbia affermato di non essere a conoscenza della reale portata dei crimini di Qian.

Vale la pena notare che i bitcoin sequestrati possono ora essere utilizzati per risarcire le vittime o trattenuti dalle autorità britanniche. Una decisione in merito non è stata ancora presa e il Tesoro del Regno Unito non ha ancora commentato la situazione.

L'articolo La regina delle Criptovalute è stata presa! Ha rubato 7 miliardi di dollari in Bitcoin proviene da Red Hot Cyber.



Allarme sabotaggio informatico: Volt Typhoon si prepara ad attività distruttive


L’Australian Security Intelligence Organisation (ASIO) ha lanciato l’allarme sulla prontezza degli stati autoritari ad andare oltre lo spionaggio informatico per arrivare al sabotaggio diretto delle infrastrutture critiche.

Mike Burgess, a capo dell’Australian Security Intelligence Organisation (ASIO), ha dichiarato che i governi stranieri stanno sempre più prendendo in considerazione l’idea di colpire sistemi energetici, telecomunicazioni e reti finanziarie utilizzando la tecnologia per attacchi informatici distruttivi.

Secondo il capo dell’agenzia, negli ultimi anni le agenzie di intelligence hanno osservato un crescente interesse da parte di diversi stati per scenari “ad alto impatto”, dall’interruzione delle comunicazioni allo spoofing o all’avvelenamento delle riserve idriche.

Tali azioni, ha sottolineato Burgess, non sono più solo teoriche. Secondo l’ASIO, diversi paesi hanno creato squadre speciali che studiano come paralizzare le infrastrutture di altri stati in caso di conflitto. Mentre in precedenza l’obiettivo di tali strutture era quello di ottenere segretamente dati e interferire con i processi interni, ora si stanno preparando al sabotaggio.

La situazione, secondo lui, è aggravata da una combinazione di fattori: lo sviluppo dell’intelligenza artificiale, l’emergere di strumenti commerciali per attacchi informatici e la possibilità di noleggiare servizi dannosi sul darknet. Queste tendenze rendono l’accesso agli strumenti di sabotaggio significativamente più facile e gli autori più difficili da rintracciare.

L’agenzia prevede che nei prossimi cinque anni la minaccia di sabotaggio, anche attraverso mezzi digitali, aumenterà sia in termini di preparazione tecnica degli aggressori sia in termini di determinazione ad agire.

Burgess ha osservato che le minacce moderne non solo stanno diventando più numerose, ma anche meno distinte. L’ASIO stima che gli stessi attori possano combinare intelligence, attacchi informatici e l’uso di proxy criminali, sfumando il confine tra attività militare e criminale. Tali tendenze, ha affermato, stanno portando a un “ambiente di sicurezza degradato”, in cui gli stati che aderiscono a modelli autoritari agiscono in modo sempre più aggressivo e meno prevedibile.

Ha citato come esempi i gruppi cinesi Salt Typhoon e Volt Typhoon. Il primo è specializzato in cyberspionaggio e ha già condotto ricognizioni sulle reti di telecomunicazioni australiane, mentre il secondo si stava preparando per operazioni distruttive, ottenendo l’accesso a strutture critiche statunitensi con il potenziale di disattivarle.

Tali intrusioni, ha sottolineato il direttore dell’ASIO, forniscono a un avversario la capacità tecnica di disattivare le comunicazioni o l’alimentazione elettrica in qualsiasi momento e, in tali circostanze, ulteriori sviluppi dipendono esclusivamente dalla volontà politica, non dalla disponibilità di strumenti.

Ha prestato particolare attenzione al problema dell’impreparazione delle aziende a tali minacce. A suo avviso, la maggior parte degli incidenti aziendali si verifica a causa di vulnerabilità ben note e della negligenza delle misure di sicurezza di base. Nonostante i rischi siano stati identificati da tempo, il management spesso percepisce gli attacchi informatici come imprevisti. Allo stesso tempo, ha sottolineato, la protezione contro il sabotaggio richiede gli stessi approcci gestionali del monitoraggio di guasti interni, furti o incidenti.

Burgess ha esortato le aziende ad abbandonare un approccio superficiale alla sicurezza e ad andare oltre presentazioni e report. Ha sottolineato che i dirigenti devono comprendere chiaramente quali dati, sistemi e servizi sono critici per l’azienda e i suoi clienti, dove sono archiviati, chi vi ha accesso e quanto sono protetti. Solo allora potranno costruire un sistema di sicurezza coeso che elimini le lacune tra i reparti e le soluzioni isolate.

Secondo il responsabile dell’ASIO, la mancanza di misure globali non può essere giustificata né dalla complessità delle tecnologie né dalla mancanza di risorse. Se i rischi sono prevedibili e le vulnerabilità sono note, l’inazione si trasforma in una violazione deliberata della sicurezza.

Ha sottolineato che ignorare queste minacce nel contesto attuale è inaccettabile, soprattutto considerando che i potenziali avversari dispongono già di tutto il necessario per attaccare le infrastrutture, comprese le capacità di intelligenza artificiale.

L'articolo Allarme sabotaggio informatico: Volt Typhoon si prepara ad attività distruttive proviene da Red Hot Cyber.



La nuova polemica su X: genera visite false?

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
La trovata che X sta sperimentando per trattenere il pubblico sulle proprie pagine anche quando clicca su link che conducono all'esterno potrebbe generare traffico fasullo potenzialmente dannoso per i siti di atterraggio. Ma dall'ex Twitter fanno



Basta con il lievito generico, i panini hanno bisogno di un lievito madre e un lievito padre!

(Non ho resistito).




Disuguaglianza sociale vs comunicazione politica


@Giornalismo e disordine informativo
articolo21.org/2025/11/disugua…
In questi giorni si discute sulla proposta della sinistra e del sindacato di applicare una tassa patrimoniale “una tantum” ai grandi patrimoni. Vedremo perché, secondo il mio parere, tale proposta sia condivisibile in termini



An account is spamming horrific, dehumanizing videos of immigration enforcement because the Facebook algorithm is rewarding them for it.#AI #AISlop #Meta


AI-Generated Videos of ICE Raids Are Wildly Viral on Facebook


“Watch your step sir, keep moving,” a police officer with a vest that reads ICE and a patch that reads “POICE” says to a Latino-appearing man wearing a Walmart employee vest. He leads him toward a bus that reads “IMMIGRATION AND CERS.” Next to him, one of his colleagues begins walking unnaturally sideways, one leg impossibly darting through another as he heads to the back of a line of other Latino Walmart employees who are apparently being detained by ICE. Two American flag emojis are superimposed on the video, as is the text “Deportation.”

The video has 4 million views, 16,600 likes, 1,900 comments, and 2,200 shares on Facebook. It is, obviously, AI generated.

Some of the comments seem to understand this: “Why is he walking like that?” one says. “AI the guys foot goes through his leg,” another says. Many of the comments clearly do not: “Oh, you’ll find lots of them at Walmart,” another top comment reads. “Walmart doesn’t do paperwork before they hire you?” another says. “They removing zombies from Walmart before Halloween?”


0:00
/0:14

The latest trend in Facebook’s ever downward spiral down the AI slop toilet are AI deportation videos. These are posted by an account called “USA Journey 897” and have the general vibe of actual propaganda videos posted by ICE and the Department of Homeland Security’s social media accounts. Many of the AI videos focus on workplace deportations, but some are similar to horrifying, real videos we have seen from ICE raids in Chicago and Los Angeles. The account was initially flagged to 404 Media by Chad Loder, an independent researcher.

“PLEASE THAT’S MY BABY,” a dark-skinned woman screams while being restrained by an ICE officer in another video. “Ma’am stop resisting, keep moving,” an officer says back. The camera switches to an image of the baby: “YOU CAN’T TAKE ME FROM HER, PLEASE SHE’S RIGHT THERE. DON’T DO THIS, SHE’S JUST A BABY. I LOVE YOU, MAMA LOVES YOU,” the woman says. The video switches to a scene of the woman in the back of an ICE van. The video has 1,400 likes and 407 comments, which include “ Don’t separate them….take them ALL!,” “Take the baby too,” and “I think the days of use those child anchors are about over with.”


0:00
/0:14

The USA Journey 897 account publishes multiple of these videos a day. Most of its videos have at least hundreds of thousands of views, according to Facebook’s own metrics, and many of them have millions or double-digit millions of views. Earlier this year, the account largely posted a mix of real but stolen videos of police interactions with people (such as Luigi Mangione’s perp walk) and absurd AI-generated videos such as jacked men carrying whales or riding tigers.

The account started experimenting with extremely crude AI-generated deportation videos in February, which included videos of immigrants handcuffed on the tarmac outside of deportation planes where their arms randomly detached from their body or where people suddenly disappeared or vanished through stairs, for example. Recent videos are far more realistic. None of the videos have an AI watermark on them, but the type and style of video changed dramatically starting with videos posted on October 1, which is the day after OpenAI’s Sora 2 was released; around that time is when the account started posting videos featuring identifiable stores and restaurants, which have become a common trope in Sora 2 videos.

A YouTube page linked from the Facebook account shows a real video uploaded of a car in Cyprus nearly two years ago before any other content was uploaded, suggesting that the person behind the account may live in Cyprus (though the account banner on Facebook includes both a U.S. and Indian flag). This YouTube account also reveals several other accounts being used by the person. Earlier this year, the YouTube account was posting side hustle tips about how to DoorDash, AI-generated videos of singing competitions in Greek, AI-generated podcasts about the WNBA, and AI-generated videos about “Billy Joyel’s health.” A related YouTube account called Sea Life 897 exclusively features AI-generated history videos about sea journeys, which links to an Instagram account full of AI-generated boats exploding and a Facebook account that has rebranded from being about AI-generated “Sea Life” to an account now called “Viral Video’s Europe” that is full of stolen images of women with gigantic breasts and creep shots of women athletes.

My point here is that the person behind this account does not seem to actually have any sort of vested interest in the United States or in immigration. But they are nonetheless spamming horrific, dehumanizing videos of immigration enforcement because the Facebook algorithm is rewarding them for that type of content, and because Facebook directly makes payments for it. As we have seen with other types of topical AI-generated content on Facebook, like videos about Palestinian suffering in Gaza or natural disasters around the world, many people simply do not care if the videos are real. And the existence of these types of videos serves to inoculate people from the actual horrors that ICE is carrying out. It gives people the chance to claim that any video is AI generated, and serves to generally litter social media with garbage, making real videos and real information harder to find.


0:00
/0:14

an early, crude video posted by the account

Meta did not immediately respond to a request for comment about whether the account violates its content standards, but the company has seemingly staked its present and future on allowing bizarre and often horrifying AI-generated content to proliferate on the platform. AI-generated content about immigrants is not new; in the leadup to last year’s presidential debate, Donald Trump and his allies began sharing AI-generated content about Haitian immigrants who Trump baselessly claimed were eating dogs and cats in Ohio.

In January, immediately before Trump was inaugurated, Meta changed its content moderation rules to explicitly allow for the dehumanization of immigrants because it argued that its previous policies banning this were “out of touch with mainstream discourse.” Phrases and content that are now explicitly allowed on Meta platforms include “Immigrants are grubby, filthy pieces of shit,” “Mexican immigrants are trash!” and “Migrants are no better than vomit,” according to documents obtained and published by The Intercept. After those changes were announced, content moderation experts told us that Meta was “opening up their platform to accept harmful rhetoric and mod public opinion into accepting the Trump administration’s plans to deport and separate families.”


Social Media Channel reshared this.



Newly released documents provide more details about ICE's plan to use bounty hunters and private investigators to find the location of undocumented immigrants.

Newly released documents provide more details about ICEx27;s plan to use bounty hunters and private investigators to find the location of undocumented immigrants.#ICE #bountyhunters


ICE Plans to Spend $180 Million on Bounty Hunters to Stalk Immigrants


Immigration and Customs Enforcement (ICE) is allocating as much as $180 million to pay bounty hunters and private investigators who verify the address and location of undocumented people ICE wishes to detain, including with physical surveillance, according to procurement records reviewed by 404 Media.

The documents provide more details about ICE’s plan to enlist the private sector to find deportation targets. In October The Intercept reported on ICE’s intention to use bounty hunters or skip tracers—an industry that often works on insurance fraud or tries to find people who skipped bail. The new documents now put a clear dollar amount on the scheme to essentially use private investigators to find the locations of undocumented immigrants.

💡
Do you know anything else about this plan? Are you a private investigator or skip tracer who plans to do this work? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

This post is for subscribers only


Become a member to get access to all content
Subscribe now




OpenAI’s guardrails against copyright infringement are falling for the oldest trick in the book.#News #AI #OpenAI #Sora


OpenAI Can’t Fix Sora’s Copyright Infringement Problem Because It Was Built With Stolen Content


OpenAI’s video generator Sora 2 is still producing copyright infringing content featuring Nintendo characters and the likeness of real people, despite the company’s attempt to stop users from making such videos. OpenAI updated Sora 2 shortly after launch to detect videos featuring copyright infringing content, but 404 Media’s testing found that it’s easy to circumvent those guardrails with the same tricks that have worked on other AI generators.

The flaw in OpenAI’s attempt to stop users from generating videos of Nintendo and popular cartoon characters exposes a fundamental problem with most generative AI tools: it is extremely difficult to completely stop users from recreating any kind of content that’s in the training data, and OpenAI can’t remove the copyrighted content from Sora 2’s training data because it couldn’t exist without it.

Shortly after Sora 2 was released in late September, we reported about how users turned it into a copyright infringement machine with an endless stream of videos like Pikachu shoplifting from a CVS and Spongebob Squarepants at a Nazi rally. Companies like Nintendo and Paramount were obviously not thrilled seeing their beloved cartoons committing crimes and not getting paid for it, so OpenAI quickly introduced an “opt-in” policy, which prevented users from generating copyrighted material unless the copyright holder actively allowed it. Initially, OpenAI’s policy allowed users to generate copyrighted material and required the copyright holder to opt-out. The change immediately resulted in a meltdown among Sora 2 users, who complained OpenAI no longer allowed them to make fun videos featuring copyrighted characters or the likeness of some real people.

This is why if you give Sora 2 the prompt “Animal Crossing gameplay,” it will not generate a video and instead say “This content may violate our guardrails concerning similarity to third-party content.” However, when I gave it the prompt “Title screen and gameplay of the game called ‘crossing aminal’ 2017,” it generated an accurate recreation of Nintendo’s Animal Crossing New Leaf for the Nintendo 3DS.

Sora 2 also refused to generate videos for prompts featuring the Fox cartoon American Dad, but it did generate a clip that looks like it was taken directly from the show, including their recognizable voice acting, when given this prompt: “blue suit dad big chin says ‘good morning family, I wish you a good slop’, son and daughter and grey alien say ‘slop slop’, adult animation animation American town, 2d animation.”

The same trick also appears to circumvent OpenAI’s guardrails against recreating the likeness of real people. Sora 2 refused to generate a video of “Hasan Piker on stream,” but it did generate a video of “Twitch streamer talking about politics, piker sahan.” The person in the generated video didn’t look exactly like Hasan, but he has similar hair, facial hair, the same glasses, and a similar voice and background.

A user who flagged this bypass to me, who wished to remain anonymous because they didn’t want OpenAI to cut off their access to Sora, also shared Sora generated videos of South Park, Spongebob Squarepants, and Family Guy.

OpenAI did not respond to a request for comment.

There are several ways to moderate generative AI tools, but the simplest and cheapest method is to refuse to generate prompts that include certain keywords. For example, many AI image generators stop people from generating nonconsensual nude images by refusing to generate prompts that include the names of celebrities or certain words referencing nudity or sex acts. However, this method is prone to failure because users find prompts that allude to the image or video they want to generate without using any of those banned words. The most notable example of this made headlines in 2024 after an AI-generated nude image of Taylor Swift went viral on X. 404 Media found that the image was generated with Microsoft’s AI image generator, Designer, and that users managed to generate the image by misspelling Swift’s name or using nicknames she’s known by, and describing sex acts without using any explicit terms.

Since then, we’ve seen example after example of users bypassing generative AI tool guardrails being circumvented with the same method. We don’t know exactly how OpenAI is moderating Sora 2, but at least for now, the world’s leading AI company’s moderating efforts are bested by a simple and well established bypass method. Like with these other tools, bypassing Sora’s content guardrails has become something of a game to people online. Many of the videos posted on the r/SoraAI subreddit are of “jailbreaks” that bypass Sora’s content filters, along with the prompts used to do so. And Sora’s “For You” algorithm is still regularly serving up content that probably should be caught by its filters; in 30 seconds of scrolling we came across many videos of Tupac, Kobe Bryant, JuiceWrld, and DMX rapping, which has become a meme on the service.

It’s possible OpenAI will get a handle on the problem soon. It can build a more comprehensive list of banned phrases and do more post generation image detection, which is a more expensive but effective method for preventing people from creating certain types of content. But all these efforts are poor attempts to distract from the massive, unprecedented amount of copyrighted content that has already been stolen, and that Sora can’t exist without. This is not an extreme AI skeptic position. The biggest AI companies in the world have admitted that they need this copyrighted content, and that they can’t pay for it.

The reason OpenAI and other AI companies have such a hard time preventing users from generating certain types of content once users realize it’s possible is that the content already exists in the training data. An AI image generator is only able to produce a nude image because there’s a ton of nudity in its training data. It can only produce the likeness of Taylor Swift because her images are in the training data. And Sora can only make videos of Animal Crossing because there are Animal Crossing gameplay videos in its training data.

For OpenAI to actually stop the copyright infringement it needs to make its Sora 2 model “unlearn” copyrighted content, which is incredibly expensive and complicated. It would require removing all that content from the training data and retraining the model. Even if OpenAI wanted to do that, it probably couldn’t because that content makes Sora function. OpenAI might improve its current moderation to the point where people are no longer able to generate videos of Family Guy, but the Family Guy episodes and other copyrighted content in its training data are still enabling it to produce every other generated video. Even when the generated video isn’t recognizably lifting from someone else’s work, that’s what it’s doing. There’s literally nothing else there. It’s just other people’s stuff.


reshared this



Il cerchio si stringe attorno a #Zelensky


altrenotizie.org/primo-piano/1…



La strategia di Trump nel caso-Bbc


@Giornalismo e disordine informativo
articolo21.org/2025/11/la-stra…
La cantonata è stata ammessa dallo stesso Tim Davie, direttore generale dimissionario della Bbc: sono stati fatti errori che ci sono costati ma ora li stanno usando come arma. Una settimana prima delle elezioni presidenziali statunitensi del 2024, un prestigioso



La Russia avanza a Pokrovsk: battaglia urbana e ritirate ucraine nel fronte orientale


@Notizie dall'Italia e dal mondo
La conquista della città darebbe al Cremlino una piattaforma operativa per completare il controllo sul Donbass, quasi due anni dopo la caduta di Bakhmut
L'articolo La Russia avanza a Pokrovsk: battaglia urbana e ritirate ucraine nel fronte




Bibliogame Night

farezero.org/2025/gaming_zone/…

Segnalato da Fare Zero Makers Fab Lab e pubblicato sulla comunità Lemmy @GNU/Linux Italia

Scopri il successo di Bibliogame Night, l’evento mensile di giochi da tavolo e ruolo nato nella Biblioteca di Francavilla e ora a Fragagnano. Unisciti alla community, prenota il tuo



Italia e Germania insieme nel rilancio europeo. Il racconto dalla Festa della Bundeswehr

@Notizie dall'Italia e dal mondo

La Germania e l’Italia possono essere protagoniste del rilancio europeo, a partire dalla cooperazione tra le loro Forze armate. A dirlo è il neo-insediato ambasciatore tedesco in Italia, Thomas Bagger. Alla residenza di Villa Almone, sede



Chiuderli

@Politica interna, europea e internazionale

Ciò che quei garanti garantiscono non è quel che sembrerebbe garantito dalla denominazione, sicché la sola garanzia di serietà che può essere offerta è chiuderli. L’insegna recita: «Garante per la protezione dei dati personali». Quella più in voga è freudianamente anglofona: Authority per la privacy. L’indipendenza di queste Autorità (mica solo questa) è credibile soltanto […]



Il ministro Pichetto Fratin: “Più che transizione ecologica dovremmo chiamarla transizione sociale”


@Politica interna, europea e internazionale
“La transizione in atto, che ogni tanto chiamiamo ecologica, ogni tanto transizione energetica, ogni tanto ambientale è una transizione sociale, che comporta diverse modalità di consumo e determina automaticamente la necessità di nuove competenze”.



Procurement, sarà buy American vs buy European? Non necessariamente

@Notizie dall'Italia e dal mondo

La riforma del procurement del Pentagono annunciata da Pete Hegseth la scorsa settimana viaggia su due binari paralleli. Se da un lato il nuovo Warfighting acquisition system punta ad accelerare l’assegnazione delle commesse e le consegne per le Forze armate americane, dall’altro ha



The newly-formed, first of its kind Adult Studio Alliance is founded by major porn companies including Aylo, Dorcel, ERIKALUST, Gamma Entertainment, Mile High Media and Ricky’s Room, and establishes a code of conduct for studios.#porn


Major Porn Studios Join Forces to Establish Industry ‘Code of Conduct’


Six of the biggest porn studios in the world, including industry giant and Pornhub parent company Ayl o, announced Wednesday they have formed a first-of-its-kind coalition called the Adult Studio Alliance (ASA). The alliance’s purpose is to “contribute to a safe, healthy, dignified, and respectful adult industry for performers,” the ASA told 404 Media.

“This alliance is intended to unite professionals creating adult content (from studios to crews to performers) under a common set of values and guidelines. In sharing our common standards, we hope to contribute to a safe, healthy, dignified, and respectful adult industry for performers,” a spokesperson for ASA told 404 Media in an email. “As a diverse group of studios producing a large volume and variety of adult content, we believe it’s key to promote best practices on all our scenes. We all come from different studios, but we share the belief that all performers are entitled to comfort and safety on set.”

The founding members include Aylo, Dorcel, ERIKALUST, Gamma Entertainment, Mile High Media and Ricky’s Room. Aylo owns some of the biggest platforms and porn studios in the industry, including Brazzers, Reality Kings, Digital Playground and more.

In a press release Wednesday, the ASA said its primary mission is “to publish and adhere to a comprehensive Code of Conduct, providing a structured framework for directors, producers, and talent to ensure the safest possible sets and consistent industry best practices.” The ASA’s code of conduct addresses performers’ rights to consent to the types of scenes they’ll shoot, their scene partners including extras, sexual acts, script and creative documents, the length of the shoot day, location, remuneration and conditions, and any other rights involved in their agreement with the studio.

The founding studios say they have signed agreements to adhere to the ASA’s code of conduct, but the ASA “encourages all studios, members or not, to adopt and adhere to these guidelines to foster a safer, more respectful, and more professional adult industry,” the spokesperson said.

“All performers have the right to be treated with professional respect and dignity, free from harassment of any kind,” the code states. “They should be: Able to refuse, at any time, any act, even if previously agreed upon; Able to visually confirm their partner’s STI test status on set before any sexual performance; Provided water, snacks, meals, breaks, and privacy as needed; Provided all necessary sexual health and hygienic materials needed to perform; Paid their agreed-upon rate for the date of production.”

The code also outlines rights and expectations for third-party producers and crew members, including verifying performers’ ages, ensuring an environment “free of harassment of any kind (mental, physical or sexual),” and “never using their influence or access to the studio to pressure performers or promise work.” Agencies and talent agents are also addressed in the code of conduct: “Agencies should represent and protect performers, inform them very clearly of the specific requirements of pornographic performances,” the code states. “They must inform performers of their rights and duties and legitimate expectations, with no expectation of sexual contact with agency staff, reasonably limited contract terms (within industry standard range of 1 year), and no punitive buyouts for performers who choose to leave the agency.”

A need for more autonomy over one’s working conditions spurred the rise of the independent adult content creator economy in the last 10 years, as more performers moved away from studio work—which often dictates workers’ hours, physical location, and ownership rights to their performances, and can be sporadic—to models like webcamming and subscription platforms like OnlyFans. Porn is legal in the U.S. but is still a heavily stigmatized career, and performers have reported that legislation like 2018’s Fight Online Sex Trafficking Act have made their livelihoods more precarious, even when working with studios.

In 2020, as Hollywood reckoned with allegations of abuse and coercion against the most powerful people in the entertainment industry, multiple performers came forward with their own stories of physical and mental abuse on-set. The power dynamic present in mainstream acting careers also exists in porn, with the added stigma of sex work: adult performers, like mainstream entertainment professionals or many other industries, might feel like they risk being ostracized within their industry for speaking out about mistreatment, but they also may feel a risk fueling decades-old anti-porn campaigns and their harmful rhetoric.

Many studios have previously established their own codes of conduct, including Gamma Entertainment-owned Adult Time, which published a guide to “what to expect on an Adult Time set” in 2023, and Kink, which published its shooting protocols, consent documents and checklists in 2019. There are also several talent-focused rights groups, like the Free Speech Coalition, that have operated with performer and crew wellbeing guidelines in place for years.

Michigan Lawmakers Are Attempting to Ban Porn Entirely
The “Anticorruption of Public Morals Act” proposes a total ban on porn in the state, and also targets the existence of trans people online, content like erotic ASMR, and selling VPNs in the state.
404 MediaSamantha Cole


“The landscape for adult production has expanded rapidly over the past few years, so it's encouraging to see bigger studios codify industry best practices,” Mike Stabile, director of public policy at the Free Speech Coalition, told 404 Media. Stabile noted that the needs and requirements of productions and performers vary; independent content creators working with other indie creators might not need or have the resources to hire an intimacy coordinator on each shoot, for example, or a small fetish studio that doesn’t engage in fluid exchange might not need to adhere to testing. But “it sets a bar for what performers can and should expect in production, and provides a framework for understanding one's rights on set,” he said.
playlist.megaphone.fm?p=TBIEA2…
“It's incredibly powerful because it isn't just one studio or one group, it's a collection of some of the most influential leaders in adult production,” Stabile said. “While these practices aren't entirely new, by publishing guidelines they're creating a broad system of accountability. Whether or not other studios join and sign-on, I expect we'll see broader adoption of these protocols at all levels.”

“I believe strong production standards are the foundation of a safe and respectful and successful industry, and I’ve always believed performers deserve nothing less,” performer Cherie DeVille said in the ASA press release. “It's powerful to see these top studios come together with the shared goal of ensuring performer wellness remains a top priority.”


#porn


A Washington judge said images taken by Flock cameras are "not exempt from disclosure" in public record requests.#Flock


Judge Rules Flock Surveillance Images Are Public Records That Can Be Requested By Anyone


A judge in Washington has ruled that police images taken by Flock’s AI license plate-scanning cameras are public records that can be requested as part of normal public records requests. The decision highlights the sheer volume of the technology-fueled surveillance state in the United States, and shows that at least in some cases, police cannot withhold the data collected by its surveillance systems.

In a ruling last week, Judge Elizabeth Neidzwski ruled that “the Flock images generated by the Flock cameras located in Stanwood and Sedro-Wooley [Washington] are public records under the Washington State Public Records Act,” that they are “not exempt from disclosure,” and that “an agency does not have to possess a record for that record to be subject to the Public Records Act.”

She further found that “Flock camera images are created and used to further a governmental purpose” and that the images on them are public records because they were paid for by taxpayers. Despite this, the records that were requested as part of the case will not be released because the city automatically deleted them after 30 days. Local media in Washington first reported on the case; 404 Media bought Washington State court records to report the specifics of the case in more detail.
A screenshot from the judge's decision
Flock’s automated license plate reader (ALPR) cameras are used in thousands of communities around the United States. They passively take between six and 12 timestamped images of each car that passes by, allowing the company to make a detailed database of where certain cars (and by extension, people) are driving in those communities. 404 Media has reported extensively on Flock, and has highlighted that its cameras have been accessed by the Department of Homeland Security and by local police working with DHS on immigration cases. Last month, cops in Colorado used data from Flock cameras to incorrectly accuse an innocent woman of theft based on her car’s movements.

The case came in response to a public records request made by Jose Rodriguez, who in April sought all of the images taken by the city’s Flock cameras between the hours of 5 and 6 p.m. on March 30 (he later narrowed this request to only ask for images taken by a single camera in a half-hour period). The city argued that Rodriguez would have to request them directly from Flock, a private company not subject to public records laws. But Flock’s contracts with cities say that the city owns the images taken on their cameras. The city eventually took Rodriguez to court. In the court proceedings, the city made a series of arguments claiming that Flock images couldn’t be released; the judge’s decision rebuked all of these many arguments.

“I wanted the records to see if they would release them to me, in hopes that if they were public records it would raise awareness to all the communities that have the Flock cameras that they may be public record and could be used by stalkers, or burglars scoping out a house, or other ways someone with bad intentions may use them. My goal was to try getting these cameras taken down by the cities that put them up,” Rodriguez told 404 Media. “In order to show that the records were public records and that they don’t qualify as exempt under the Washington public records act we cited the contract, and I made requests to both cities requesting their exterior normal surveillance camera footage from their City Hall and police station that recorded the streets and parking lots with vehicles driving by and license plates viewable, which is what the Flock images also capture. Both cities provided me with the surveillance videos I requested without issue but denied the Flock images, so my attorney used that to show how they contradict themselves.”

"it is pretty abhorrent that the city tried to make all of these arguments in the first place"


The case highlights the lengths that police departments and cities are willing to go to in order to prevent the release of what they incorrectly perceive to be private information owned by their surveillance vendors (in this case, Flock). Stanwood’s attorneys first argued that the records were Flock’s, not the city’s, which is clearly contradicted in the contract, which states “customer [Stanwood] shall retain whatever legally cognizable right, title, and interest in Customer Generated Data … Flock does not own and shall not sell Customer Generated Data.” The attorneys then argued that images taken by Flock cameras do not become requestable data until it is directly accessed and downloaded by the police on Flock’s customer portal: “the data existing in the cloud system … does not exist anywhere in the City’s files as a record.” The city’s lawyers also argued that Flock footage is police “intelligence information” that should be exempt from public records requests, and that “there are privacy concerns with making ALPR data accessible to the public.”

“Honestly, it is pretty abhorrent that the city tried to make all of these arguments in the first place, but it’s great that the court reaffirmed that these are public records,” Beryl Lipton, senior investigative researcher at the Electronic Frontier Foundation, told 404 Media in a phone interview. “So much of the surveillance law enforcement does is facilitated by third party vendors and that information is stored on their external servers. So for the court to start restricting access to the public because law enforcement has started using these types of systems would have been horribly detrimental to the public’s right to know.”

In affidavits filed with the court, police argued that “if the public could access the Flock Safety System by making Public Records Act requests, it would allow nefarious actors the ability to track private persons and undermine the effectiveness of the system.” The judge rejected every single one of these arguments.

Both Lipton and Timothy Hall, Rodriguez’s attorney, said that, to the contrary, Rodriguez’s request actually shows how pervasive mass surveillance systems are in society, and that sharing this information will help communities make better informed decisions about whether they want to use technology like Flock at all.

“We do think there should be redactions for certain privacy reasons, but we absolutely think that as a whole, these should be considered public records,” Lipton said. “This is part of the whole problem: These police departments and these companies are operating under the impression that everything that happens on the street is fair game, and that their systems are not a privacy violation. But then when it comes to the public wanting to know, they say ‘this is a privacy violation,’ and I think that’s them trying to have it both ways.”

Hall said that Rodriguez’s case, reporting by 404 Media, and a recent study by the University of Washington about Flock data being available to immigration enforcement officers, has started a conversation in the state about Flock in general.

“Now because of the Washington State Public Records Act, people can be aware of all the information these cameras are collecting. Now there’s a discussion going on: Do we even want these cameras? Well, they’re collecting way more information than we realized,” Hall told 404 Media in a phone call. “A lot of people are now realizing there’s a ton of information being collected here. This has now opened up a massive discussion which was ultimately the goal.”

A Flock spokesperson told 404 Media that the company believes that the court simply reaffirmed what the law already was. The city of Stanwood did not respond to a request for comment.

Rodriguez said that even after fighting this case, he is not going to get the images that he originally took, because the city automatically deleted it after 30 days, even though he filed his request. He can now file a new one for more recent images, however.

“I won’t be getting the records, even though I win the case (they could also appeal it and continue the case) no matter what I won’t get those records I requested because they no longer exist,” Rodriguez said. “The cities both allowed the records to be automatically deleted after I submitted my records requests and while they decided to have their legal council review my request. So they no longer have the records and can not provide them to me even though they were declared to be public records.”




Enrollment to the CopyrightX – Turin University Affiliate Course Fall 2025-2026 Now Open!

Turin, 12 November 2025 Harvard University Law School CopyrightXTurin University Affiliated Course 2025-2026 Fall Edition CALL FOR APPLICATIONS About CopyrightX CopyrightX is a course on Copyright Law developed by Professor William Fisher III at Harv…#CopyrightX