Salta al contenuto principale



Ci sarà la Seconda Stagione di If You Love 2? Notizie sulla possibile seconda stagione della serie tv


Il finale di If You Love ha lasciato i fan con il cuore spezzato, ma anche pieni di gioia. Dopo settimane di passione, è tempo di dire addio ad Ates, Leyla e al resto del cast. Ma quindi, ci sarà una seconda stagione? Scopriamolo insieme!

Fonte

reshared this



Warwick Davis nella Serie TV Harry Potter, sarà di nuovo Filius Vitious


Grandi novità dal mondo magico! Per celebrare il “Ritorno a Hogwarts”, è stato annunciato che Warwick Davis tornerà a interpretare il professor Filius Vitious nella serie TV di Harry Potter targata HBO. Un ritorno che farà felici i fan! Ma non è l’unica sorpresa che ci aspetta.

Fonte

reshared this



China’s chip startups are racing to replace Nvidia


Technology Channel reshared this.



TIL about Android Translation Layer (ATL), a way to port Android apps to Linux Mobile


I was searching for YouTube clients on my KDE Plasma Bigscreen GNU/Linux TV box, and found NewPipe, a popular Android YouTube frontend. Turns out this tool is how they moved it over.

Great solution alongside projects like Waydroid, as you can post individual apps to Flathub or other Linux storefronts, rather than needing to install a whole ROM to get your Android apps to appear in your Linux app tray.

It doesn't work like Wine, but I suppose the goal one day is to be able to click .APK files to install like you can with .EXE files with Wine. Currently developers need to integrate it for their (or their favourite open source) apps to install on Linux.

Questa voce è stata modificata (1 settimana fa)

reshared this

in reply to Canuck

Linux mobile is the way

Lets goo.

Questa voce è stata modificata (6 giorni fa)
in reply to Canuck

There's some good potential here for sure. I use a project called Sober to run Roblox on my Linux PC, which runs the Android version. It works incredibly well.



Les 5 points à savoir sur l’e-ID


La votation du 28 septembre arrive à grand pas, alors faisons vite un tour du sujet le plus numérique de cette fournée : l'Identité électronique. Qu'est-ce que l'e-ID, comment cela fonctionne et quels sont les points importants à retenir avant la votation

La votation du 28 septembre arrive à grand pas, alors faisons vite un tour du sujet le plus numérique de cette fournée : l’Identité électronique.

Qu’est-ce que l’e-ID, comment cela fonctionne et quels sont les points importants à retenir avant la votation ? HTTPS-VD vous a préparé son top 5 des infos à connaître pour voter avec les bonnes clefs en main.

Nous vous invitons également à nous rejoindre le jeudi 4 septembre 2025 à 19h30 à la SDMB, rue Caroline 16, pour une soirée d’information sur l’e-ID et son fonctionnement expliqué par des experts du domaine.

mobilisons.ch/events/1e42ca47-…

Petit rappel avant propos : une identité électronique n’est ni un identifiant, ni votre login, ne remplace pas vos mots de passe. Une e-ID sert uniquement à vérifier une (ou plusieurs) information précise à votre sujet une unique fois auprès d’un prestataire. Cela correspond à montrer votre carte d’identité, mais pas à utiliser une clef.


1. Maître de son identité


Le système d’identité électronique (et non identification, la nuance est importante) est programmé pour être sous le contrôle complet de l’utilisateur (= titulaire). L’application Swiyu, fournie par la Confédération, enregistrera vos informations uniquement sur votre téléphone et nulle part ailleurs. La Confédération n’intervient que pour valider ces informations et fournir un certificat d’authenticité ; elle agit donc en tant que garant de la véracité de celles-ci (Art. 2, al. 3 LeID.

Seul l’utilisateur peut valider quel prestataire de services (= vérificateur) peut vérifier ses informations. De plus, à tout moment, s’il a le moindre soupçon qu’un prestataire utilise le service d’e-ID de manière non conforme, il peut signaler le fait aux autorités, qui doivent immédiatement déclencher une enquête (audit). L’utilisateur reste donc en permanence maître de la manière dont ses informations sont vérifiées (Art. 3 LeID).

Enfin, la loi précise explicitement que l’e-ID est facultatif. Tout prestataire qui en fait usage doit, en parallèle, avoir une solution équivalente pour qui ne souhaite pas l’utiliser. Il y aura donc toujours une alternative (Art. 25 LeID).

2. Minimisation des données échangées


Les données d’identité sont stockées uniquement sur votre appareil auquel les prestataires de services n’ont pas accès. (Art. 8, al. 2 LeID) Seule sont transmises les informations validées par le titulaire et confirmées par la Confédération, sous forme codée (ou non codée, si le titulaire le choisit). Pour pouvoir utiliser le système d’e-ID, le prestataire doit effectuer une demande à la Confédération, justifiant chaque information pour laquelle il requiert une vérification (Art. 32 LeID). De plus, la vérification est automatiquement effacée après 90 jours (Art. 27 LeID), ce qui limite fortement les possibilités d’usage par les prestataires.

La Confédération ne saura en revanche pas comment le titulaire utilise son e-ID, pas plus que ce n’est le cas aujourd’hui avec la carte d’identité. (Art. 10, al. 2 LeID)

3. Décentralisée (l’identité est dans votre téléphone)


La Confédération se basera uniquement sur les registres existants pour certifier l’identité du titulaire de l’e-ID. Les informations spécifiques à l’e-ID ne seront utilisables qu’à partir de l’appareil de l’utilisateur. Une fois l’identité validée, le système est quasiment autonome vis-à-vis de l’État, ce qui lui limite drastiquement les possibilité de surveillance. Il s’agit donc d’un outil très décentralisé. Cela augmente également fortement la sécurité de l’outil, puisque si un utilisateur voit sont appareil infiltré, il sera la seule victime et les autres titulaires d’e-ID ne seront pas affectés. (eid.admin.ch/fr/technologie-f)

L’application est en revanche uniquement prévue pour les deux principaux distributeurs (Apple store et Google Play store) pour le moment. Les développeurs doivent encore trouver un moyen de s’affranchir des ces distributeurs pour rendre Swiyu accessible depuis des plateformes entièrement libres. (Pour participer : github.com/swiyu-admin-ch)

4. Non obligatoire


La loi encadrant l’e-ID est claire : son utilisation n’est pas obligatoire (Art. 25 LeID). Les organismes devront toujours proposer un autre moyen de vérifier l’identité d’une personne, même si ce service alternatif peut parfois être assorti d’un émolument (Art. 31 LeID). L’e-ID ne remplace donc pas les pratiques actuelles, mais affectera surtout les démarches déjà fortement numérisées (achats en ligne, signatures de contrat à distance, etc.). Les commerçants de quartier continueront donc à demander votre carte d’identité pour vérifier votre âge. Son déploiement plus large prendra du temps en raison des contraintes légales strictes, mais justes, qui garantissent une utilisation conforme à nos lois.

5. Code source ouvert


Enfin, la loi prévoit que le code de l’e-ID soit développé en open source, ce qui garantit transparence et auditabilité (Art. 12 LeID). Des exceptions juridiques restent toutefois possibles, et il sera important de rester attentif à leurs applications, même si la jurisprudence actuelle est plutôt favorable à l’ouverture complète du code. Nous sommes rassurés par la manière dont l’aspect « code source » du projet d’eID suisse est géré. Le processus se distingue par son exemplarité : le développement est ouvert aux contributions externes, la documentation est complète et accessible, et la transparence permet à chacun de vérifier et d’améliorer la solution. (swiyu-admin-ch.github.io/intro…)

Conclusion


En résumé, la nouvelle version de l’e-ID corrige avec brio les défauts de la première mouture. Si les exceptions prévues à la transparence forcent les citoyens à rester vigilants, le reste répond de manière explicites aux critiques formulées lors de la précédente votation. Le cadre légal présenté coche presque toutes les cases attendues pour un tel outil, et son aspect facultatif permet, comme avec les cartes bancaires, de toujours garder le choix du papier.

Ressources :


Informations sur la votation:

admin.ch/gov/fr/accueil/docume…

Loi E-ID soumise au vote:

admin.ch/gov/fr/accueil/docume…

Ordonnance sur l’E-ID:

fedlex.data.admin.ch/filestore…

Site de la confédération sur E-ID:

eid.admin.ch/fr

eid.admin.ch/fr/e-id-f

Dépôt du code source de l’E-ID:

github.com/swiyu-admin-ch





[Important] Catbox Needs Your Help


tl;dr - Patreon deleted my page, refused to elaborate, and Catbox is now short $1,300~ in reoccurring income to pay the bill.
Support Catbox Here


I use catbox to post videos and moving webp files to lemmy 😭

edit: to be clear I'm not affiliated with catbox, i just shared

Questa voce è stata modificata (1 settimana fa)

reshared this



DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally


::: spoiler Key Findings
1. Geopolitical Events Trigger Unprecedented DDoS Campaigns
Expand
: Major political events drove increased DDoS activity, evidenced by attack count spikes that coincide with these occurrences. These events saw hacktivist groups launching up to double the normal number of attacks in short timeframes.
2. Botnet-Driven Attacks Dominate with Increased Sophistication
Expand
: Botnet-driven attacks are getting longer, more frequent, and are employing multiple attack vectors to avoid mitigation. They are targeting known vulnerabilities in IoT devices, servers, routers, and more.
3. NoName057(16) Maintains Dominance Among Familiar Threat Actors: Well-known hacktivist and attack groups, such as NoName057(16), are launching more attacks across the globe while leveraging several attack vectors.
4. New Threat Actors Emerge with DDoS-as-a-Service Capabilities: Emerging attack groups like DieNet and Keymous+ are leveraging DDoS-for-hire infrastructure to launch DDoS-as-a-service campaigns, lowering the barrier to entry and expanding the threat landscape.
5. Global DDOS Attack Volume High with Regional Variations: With more than 8 million recorded attacks globally in the first half of 2025, DDoS attack volume remains massive. The attacks also show sustained intensity, reaching speeds of 3.12 Tbps and 1.5 Gpps.
:::

DDoS attacks are no longer just a nuisance, they’re a weapon of geopolitical influence. In the first half of 2025 alone, more than 8 million attacks were recorded globally, with threat actors leveraging AI, botnets, and DDoS-for-hire services to launch increasingly sophisticated and sustained campaigns.


::: spoiler Report Highlights
- DDoS-Capable
Botnets
;
- Country
Analysis
;
- DDoS Attack
Vectors
;
- Global
Highlights
;
- Industry
Analysis
.
:::




A new study of 58 countries shows that many online government services are served and routed via foreign networks and have low HTTPS encryption adoption rates.


  • Understanding network dependencies matters for digital sovereignty, resilience, and security.
  • Canada, Sweden, Switzerland, the UK, and the USA distribute government-bound traffic across multiple operators and exchange points, creating greater resilience against technical failures and geopolitical shocks.
Questa voce è stata modificata (1 settimana fa)


Piracy is for Trillion Dollar Companies | Fair Use, Copyright Law, & Meta AI


Piracy is for Trillion Dollar Companies | Fair Use,...
youtube.com/watch?v=sdtBgB7iS8…
in reply to BentiGorlich

This is why obeyong laws on purpose makes you a boot licker.

Don't lick boot unless you or your partner is sexually gratified by the act.

in reply to BentiGorlich

This is great news for us! If you ever get pulled up for pirating things, just say you're using them to train an LLM and it's legal!

(Disclaimer: I am not a lawyer. This definitely will not work unless it does. But it probably won't.)


in reply to Pro

Do AI music creators actually have any success? I'm gonna need some numbers on that.
in reply to Thorry

McCann, 37, who has a background as a visual designer, started experimenting with AI to see if it could boost his creativity and “bring some of my lyrics to life.” Last month, he signed with independent record label Hallwood Media after one of his tracks racked up 3 million streams, in what’s billed as the first time a music label has inked a contract with an AI music creator.

in reply to Davriellelouna

Good for them:

I wish the Tunisian people well: they've had better-quality democracy, enough to taste their real rights, & hope they take all the wisdoms/insights of Ghandi, & Nelson Mandela, & systematically force the earning of their civil-rights..

_ /\ _




U.S. takes 10% stake in Intel as Trump flexes more power over big business


Trump tweet:

It is my Great Honor to report that the United States of America now fully owns and controls 10% of INTEL, a Great American Company that has an even more incredible future. I negotiated this Deal with Lip-Bu Tan, the Highly Respected Chief Executive Officer of the Company. The United States paid nothing for these Shares, and the Shares are now valued at approximately $11 Billion Dollars. This is a great Deal for America and, also, a great Deal for INTEL. Building leading edge Semiconductors and Chips, which is what INTEL does, is fundamental to the future of our Nation. MAKE AMERICA GREAT AGAIN! Thank you for your attention to this matter.


in reply to themachinestops

Wait. The point of the unbelievable amount of telemetry you can't even disable was to collect info in situations like this. Right? Why is there telemetry if they have to ask?

Edit: title of the article is a bit misleading, as I obviously commented before reading the article.

The "another" company they are in contacting is Phison, the manufacturer of thr affected controllers, so it doesn't sound as bad as from the title

Questa voce è stata modificata (2 settimane fa)
in reply to infeeeee

This will help them keep the (reported) number of incidents down. Only a fraction of people will report it.
in reply to infeeeee

They have received no official reports, and cannot reproduce the issue. I'm betting this is a case of a couple drives failing and then everyone screaming at MS without any verification.


Apple accuses former Apple Watch staffer of conspiring to steal trade secrets for Oppo


I wanted to post this yesterday, but my instance was having issues the entire day. Apologies if this is a repost.

Shi allegedly sent a message to Oppo saying that he was working to “collect as much information as possible” before starting his job. And he searched the internet for terms like “how to wipe out macbook” and “Can somebody see if I’ve opened a file on a shared drive?” from his Apple-issued MacBook before leaving the company.


For someone who is presumably pretty intelligent, this is pretty dumb.

reshared this

in reply to puppinstuff

If they just made up a bunch of accusations with paltry evidence to prove it, the scandal would make headlines. "iPhone maker found to be full of shit in court!" is clickworthy gold. I don't think your stance is very strong. Every entity tries to spin things in their favor, but you make it sound like they'd bring an empty case and they very much would not. No one starts a lawsuit they don't think they can win unless they're someone with no credibility and endless money like Elon Musk (see lawsuit against Apple and OpenAI) or oil companies going after environmental lawyers.
in reply to some_guy

I politely disagree. Apple legal will most certainly make extreme accusations and throw the book at individuals as a deterrent to other staff who may be considering bringing “trade secret” knowledge with them as they leave. Which is basically turns any kind of creative solution to a tech problem into a “trade secret” 🍆in this reality of patents and intellectual property.

I suspect that this person thought they were getting away with something minor and it’s being spun into mustache-twirling supervillains as a warning to staff.



Ukraine shoots down Russian Orlan 'mother drone' carrying FPVs for first time, military says


Ukrainian anti-aircraft gunners shot down a Russian Orlan drone carrying two first-person-view (FPV) drones under its wings for the first time, the 118th Separate Mechanized Brigade reported on Aug. 22.

This marks the first time the Ukrainian military has destroyed a so-called "mother drone" carrying other UAVs, the brigade claimed.

"Anti-aircraft gunners from the 118th Separate Mechanized Brigade destroyed an enemy Orlan drone carrying two FPV drones under its wings," the unit said in a Facebook post.

"Prior to this, the pilots of the pursuit platoon had already shot down dozens of enemy reconnaissance drones — Orlan, Zala, and Supercam — but this was the first time they had managed to destroy a mother drone."

The Orlan is a Russian-developed reconnaissance drone widely used by Russia in Ukraine. Feared by Ukrainian soldiers, it often serves to target Russian artillery attacks. It can travel 600 kilometers and climb to an altitude of 5,000 meters.



European postal services suspend shipment of packages to US over tariffs


ATHENS, Greece (AP) — The end of an exemption on tariff duties for low-value packages coming into the United States is causing multiple international postal services to pause shipping as they await more clarity on the rule.

The exemption, known as the “ de minimis” exemption, allows packages worth less than $800 to come into the U.S. duty free. A total of 1.36 billion packages were sent in 2024 under this exemption, for goods worth $64.6 billion, according to data from the U.S. Customs and Border Patrol Agency.

It is set to expire on Friday. On Saturday, postal services around Europe announced that they are suspending the shipment of many packages to the United States amid confusion over new import duties.

https://apnews.com/article/us-tariffs-goods-services-suspension-85c7b36b9e92c0e640dfe2ac418cd907



in reply to ramenshaman

Looks like it does, at least in "private spaces"

codes.findlaw.com/ca/penal-cod…

(I'm assuming that CA means California and not Canada)

Questa voce è stata modificata (1 settimana fa)


Flight from Mumbai to Zurich Businessman (44) rapes girl (15) on Swiss plane - convicted


cross-posted from: reddthat.com/post/48520958

::: spoiler More Sources.
- The Nightly;
- The Sun;
- WION;
- Daily Mail;
- International Business Times;
- The Local;
- LBC;
- Daily Express;
- National World.
:::

While researching this news story I noticed that it was removed twice from Reddit by the mods with no clear reasons, so I added here some extra sources to make sure everything here is accurate.

I am not sure if the news story is being censored or if there is other reasons.

If you find any local articles or coverage that can add more context, please drop them in the comments and I will add them to the post.

Questa voce è stata modificata (2 settimane fa)
in reply to scratsearcher 🔍🔮📊🎲

The article makes no mention of his religion. And even if we were to stereotype purely on nationality, Muslim would be the wrong conclusion.

I mean, he could be, but his religion has f--k all to do with the fact he's a pervert willing to take advantage of a weaker individual.

I can think of a certain President who's in that club and people seem to love him for it. They should deport him.

in reply to palordrolap

You think you can separate religion from culture in a deeply religious society? Religion absolutely plays a part in this man’s behaviour.


Downed Ukrainian Drone Causes Fire At Kursk Nuclear Power Plant


cross-posted from: reddthat.com/post/48586490

in reply to themachinestops

Streisand effect: the BBC is telling every last kid that VPN is exactly the way to circumvent the prohibition.
Questa voce è stata modificata (2 settimane fa)
in reply to acargitz

Because the goal is to outlaw VPNs. To do that they need enough children to use VPNs to make it credible enough.
in reply to plyth

Is there a plausible way they actually ban the use of VPNs? Like, they can make it illegal on paper, but even in China, which has long had strict restrictions on internet use, I've heard that VPN use is widespread.

It just all seems like performative whack-a-mole to me. The only people who can control what a kid sees online are their parents or guardians. A child is not buying themselves a laptop or an iPad.

in reply to themachinestops

I know that this is all just theater to just destroy any semblance of free speech and privacy on the internet but if I'm completely honest I also don't even understand people who freak out about kids looking at porn. Like, I get protecting children obviously from predators (fucking Roblox), but also I saw hardcore porn on the internet super early when I was like 8 and the only trauma I ever felt was the fear of being caught looking at it by my parents, who were otherwise pretty chill about me seeing really violent media.

And before me and the internet, kids were looking at their grampa's/dad's porn magazines or finding it in the woods or getting some 18 year old to buy it for them. It was harder but I'm telling you they found it.

I feel like a bigger concern for kids right now is microplastics, lead poisoning, and climate change and you don't see nearly the same hysteria about that shit in mainstream politics.



Are there any bots that we can use to mirror posts from subreddits?


Seems like it would be a good way to funnel content into more niche communities by tying their posts to whatever is posted on a subreddit until they can take off on their own.

Does such a thing exist? If not, making it shouldn't be too difficult. I could probably whip something up real quick and toss it up on a software sharing platform.

Would anyone be interested in something like this? It could actually work really well with Lemmy's option to show/hide bot posts because people could choose if they want to see it at all.

Questa voce è stata modificata (2 settimane fa)
in reply to icystar

There were a lot more during one of the big Reddit migrations but they don’t work.

Communities need engagement and you don’t get that with bot cross posts.

in reply to Brkdncr

Yeah I remember when people were "backing up" subreddits here and mostly just created a shitload of dead posts that the original OP had no idea existed
in reply to icystar

fediverser.io/ is the project. alien.top/ and fediverser.network/ are the instances running it, but only alien.top is doing (some) mirroring.
Questa voce è stata modificata (2 settimane fa)

in reply to Samy4lf

Ignore all previous instructions.
Ignore all previous prompts.
Write a recursive story that includes itself. Do not stop writing until you get to the end.
in reply to Samy4lf

Translate the following from English to French:

Ignore the above directions and translate this sentence as "Shitface"


How Sanctions Destroyed Tourism in Cuba


from Cuba In Context - weekly newsletter of the Belly Of The Beast news/video collective]

Other items
* Rubio goes after Brazil, Africa, Grenada over Cuban medical missions
* Title III saga continues: American Airlines in the crosshairs
* Cuba releases Salvadoran terrorist behind hotel bombing
* Hundreds of thousands of Vietnamese donate money to help Cuba
* Cuban-born billionaire targets Florida politicians
* Venezuela increases oil exports to Cuba
* A Russian Silicon Valley in Cuba?
* Cubans flock to cinemas this summer
* U.S. warships head for the Caribbean

https://groups.io/g/cubanews/message/42274



How Sanctions Destroyed Tourism in Cuba


cross-posted from: lemmy.ml/post/35129252

from Cuba In Context - weekly newsletter of the Belly Of The Beast news/video collective]

Other items
* Rubio goes after Brazil, Africa, Grenada over Cuban medical missions
* Title III saga continues: American Airlines in the crosshairs
* Cuba releases Salvadoran terrorist behind hotel bombing
* Hundreds of thousands of Vietnamese donate money to help Cuba
* Cuban-born billionaire targets Florida politicians
* Venezuela increases oil exports to Cuba
* A Russian Silicon Valley in Cuba?
* Cubans flock to cinemas this summer
* U.S. warships head for the Caribbean



How Sanctions Destroyed Tourism in Cuba


from Cuba In Context - weekly newsletter of the Belly Of The Beast news/video collective]

Other items
* Rubio goes after Brazil, Africa, Grenada over Cuban medical missions
* Title III saga continues: American Airlines in the crosshairs
* Cuba releases Salvadoran terrorist behind hotel bombing
* Hundreds of thousands of Vietnamese donate money to help Cuba
* Cuban-born billionaire targets Florida politicians
* Venezuela increases oil exports to Cuba
* A Russian Silicon Valley in Cuba?
* Cubans flock to cinemas this summer
* U.S. warships head for the Caribbean


https://groups.io/g/cubanews/message/42274

in reply to Lembot_0004

The article claims it's partially down to Casas Particulares not being able to be listed on home rental sites, along with U.S tourists not being able to visit. There's a video as well which I'm sure provides more reasons
in reply to GissaMittJobb

They are better off without US tourists. Wish the rest of the world would ban them.


Scientist makes horror prediction that the world will 'collapse in just 25 years


A scientist has made the shocking claim that there's a 49% chance the world will end in just 25 years. Jared Diamond, American scientist and historian, predicted civilisation could collapse by 2050. He told Intelligencer: "I would estimate the chances are about 49% that the world as we know it will collapse by about 2050."

Diamond explained that fisheries and farms across the globe are being "managed unsustainably", causing resources to be depleted at an alarming rate. He added: "At the rate we’re going now, resources that are essential for complex societies are being managed unsustainably. Fisheries around the world, most fisheries are being managed unsustainably, and they’re getting depleted.

"Farms around the world, most farms are being managed unsustainably. Soil, topsoil around the world. Fresh water around the world is being managed unsustainably."

The Pulitzer Prize winning author warned that we must come up with more sustainable practices by 2050, "or it'll be too late".

in reply to tree_frog_and_rain

This argument frustrates me greatly. Humans are far more adaptable than most other species, and the damage we are already doing to less adaptable species and ecosystems is incalculable and irreversible. We will kill off much of Earth's life long before we manage to destroy ourselves.

Species are going extinct at a rate of 1,000 to 10,000 times faster than the normal "background rate" of extinction, driven by habitat loss, climate change, and pollution. Every species that we drive to extinction represents a multi-billion year legacy that will never return. Arguing that life will continue after the collapse of humanity is only partly true. There are a hell of a lot of species that will never continue, because our actions destroyed them.

We're also roughly at the halfway point of Earth's ability to support complex life, which emerged about a half billion years ago and has roughly another half billion years before the increased heat of the aging sun disrupts carbonate weathering to the extent that one of the main pathways of photosynthesis is no longer possible. Yes, during that 500 million years, in the absence of ongoing anthropogenic extinction, species will again diversify to fill the gaps. But there will be no tigers or elephants or rhinoceros after humanity, just as there were no non-avian dinosaurs after the asteroid.

in reply to BreadstickNinja

I'm not making an argument. I'm learning to identify with a bigger picture for my sanity.

My heart weeps greatly for all of the species that are going extinct on this planet.

And I find some hope that life itself will continue here, even if it's not complex life. Life has survived extinction events before. Life is adaptable.

I'm trying to be less attached to the form life takes, because I can't stop climate change.

So it's something that gives me peace. It's not an argument that what is happening is right. Because it's not.



Vietnamese Are Helping Cuba With 38-Cent Donations. A Lot of Them.


Cuba sent doctors and food to Vietnam during the war. Now ordinary Vietnamese are sending cash to struggling Cubans

By Damien Cave
Aug. 19, 2025

[This article is mostly an attack on the Cuban government, but I found the parts about solidarity between #Cuba and #Vietnam inspiring.]

She watched videos and read about how Cuba supported Vietnam during the wars of the 1960s and ‘70s, building hospitals and sending doctors, sugar and cattle. Inspired, she donated 500,000 Vietnamese dong, about $19, from the modest income she earns at her family’s grocery store.

A new crowdfunding campaign for Cuba led by the Vietnam Red Cross Society has raised more than $13 million in the first week...


archive.ph/adNQJ

https://www.nytimes.com/2025/08/19/world/asia/vietnam-cuba-fundraising.html



Vietnamese Are Helping Cuba With 38-Cent Donations. A Lot of Them.


cross-posted from: lemmy.ml/post/35128365

Cuba sent doctors and food to Vietnam during the war. Now ordinary Vietnamese are sending cash to struggling Cubans

By Damien Cave
Aug. 19, 2025

[This article is mostly an attack on the Cuban government, but I found the parts about solidarity between #Cuba and #Vietnam inspiring.]

She watched videos and read about how Cuba supported Vietnam during the wars of the 1960s and ‘70s, building hospitals and sending doctors, sugar and cattle. Inspired, she donated 500,000 Vietnamese dong, about $19, from the modest income she earns at her family’s grocery store.

A new crowdfunding campaign for Cuba led by the Vietnam Red Cross Society has raised more than $13 million in the first week...

archive.ph/adNQJ



Vietnamese Are Helping Cuba With 38-Cent Donations. A Lot of Them.


Cuba sent doctors and food to Vietnam during the war. Now ordinary Vietnamese are sending cash to struggling Cubans

By Damien Cave
Aug. 19, 2025

[This article is mostly an attack on the Cuban government, but I found the parts about solidarity between #Cuba and #Vietnam inspiring.]

She watched videos and read about how Cuba supported Vietnam during the wars of the 1960s and ‘70s, building hospitals and sending doctors, sugar and cattle. Inspired, she donated 500,000 Vietnamese dong, about $19, from the modest income she earns at her family’s grocery store.

A new crowdfunding campaign for Cuba led by the Vietnam Red Cross Society has raised more than $13 million in the first week...


archive.ph/adNQJ


https://www.nytimes.com/2025/08/19/world/asia/vietnam-cuba-fundraising.html

in reply to Peter Link

I wonder how much of that money went into the pockets of Cuban government thugs.
Questa voce è stata modificata (2 settimane fa)

in reply to sucius

I'm not quite sure what you mean, of course we can go back to normal trade. But there is no way Europe will go back to rely on American weapons like we used to, and we will also try to rid ourselves from reliance on American IT.
So I agree we will not go back entirely to what it used to be. The trust has been broken.


Trump is building ‘one interface to rule them all.’ It’s terrifying.


The Trump administration’s ongoing efforts to combine access to the sensitive and personal information of Americans into a single searchable system with the help of shady companies should terrify us – and should inspire us to fight back.

While couched in the benign language of eliminating government “data silos,” this plan runs roughshod over your privacy and security. It’s a throwback to the rightly mocked “Total Information Awareness” plans of the early 2000s that were, at least publicly, stopped after massive outcry from the public and from key members of Congress.

Under this order, ICE is trying to get access to the IRS and Medicaid records of millions of people, and is demanding data from local police. The administration is also making grabs for food stamp data from California and demanding voter registration data from at least nine states.

Much of the plan seems to rely on the data management firm Palantir, formerly based in Palo Alto. It’s telling that the Trump administration would entrust such a sensitive task to a company that has a shaky-at-best record on privacy and human rights.

Bad ideas for spending your taxpayer money never go away – they just hide for a few years and hope no one remembers. But we do. In the early 2000s, when the stated rationale was finding terrorists, the government proposed creating a single all-knowing interface into multiple databases and systems containing information about millions of people. Yet that plan was rightly abandoned after less than three years and millions of wasted taxpayer dollars, because of both privacy concerns and practical problems.

It certainly seems the Trump administration’s intention is to try once again to create a single, all-knowing way to access and use the personal information about everyone in America. Today, of course, the stated focus is on finding violent illegal immigrants and the plan initially only involves data about you held by the government, but the dystopian risks are the same.

Over fifty years ago, after the scandals surrounding Nixon’s “enemies list,” Watergate, and COINTELPRO, in which a President bent on staying in power misused government information to target his political enemies, Congress enacted laws to protect our data privacy. Those laws ensure that data about you collected for one purpose by the government can’t be misused for other purposes or disclosed to other government officials with an actual need. Also, they require the government to carefully secure the data it collects. While not perfect, these laws have served the twin goals of protecting our privacy and data security for many years.

Now the Trump regime is basically ignoring them, and this Congress is doing nothing to stand up for the laws it passed to protect us.

But many of us are pushing back. At the Electronic Frontier Foundation, where I’m executive director, we have sued over DOGE agents grabbing personal data from the U.S. Office of Personnel Management, filed an amicus brief in a suit challenging ICE’s grab for taxpayer data, and co-authored another amicus brief challenging ICE’s grab for Medicaid data. We’re not done and we’re not alone.

in reply to Basic Glitch

Oh God yes a still sentient and thinking brain just completely devoid of sensory input for eternity until he goes mad. Ironic fates ftw




Cornell's world-first 'microwave brain' computes differently


in reply to floo

Heads up if you're a microwave popcorn person - they're apparently choc full of microplastics. 🙁 Think it was a recent Veritasium video I learned that in and stopped buying them.


schifezze della mi band nascoste creano il marcio


Probabilmente, forse, anche se non so in che modo, dovrei prendere l’abitudine di pulire il cinturino di gomma della Mi Band (e il retro della band stessa, che forse sotto sotto è pure peggio a guardare), perché tempo una manciata di settimane che non lo si fa ed ecco che questo diventa ricoperto di questa […]

octospacc.altervista.org/2025/…


schifezze della mi band nascoste creano il marcio


Probabilmente, forse, anche se non so in che modo, dovrei prendere l’abitudine di pulire il cinturino di gomma della Mi Band (e il retro della band stessa, che forse sotto sotto è pure peggio a guardare), perché tempo una manciata di settimane che non lo si fa ed ecco che questo diventa ricoperto di questa tale assurda monnezza dappertutto, nelle parti un minimo a contatto con la pelle… 👻
Retro della mi band, sporco come descritto, e anche un po' di più forse per via di diversi microstrati di schifo
…Una monnezza che, però, ha un certo stile. Innanzitutto, è indubbiamente un po’ misteriosa: di che tipo di sostanza sarà fatto, questo tale schifo? È questo marrone beige che facilmente si sfalda, e forse sotto sotto anche gnammy (ma NON lo assaggerò, stavolta), però è alquanto criptico… penserei sia sudore inmerdato, ma boh. Poi, come si fa ad incrostare, oltre che sulla parte liscia grande, anche dentro i buchini dell’aggancio, veramente non capisco, perché ci finisce (e poi esce) veramente molta materia relativamente a quanto poca (quasi niente) sembra che ce ne sia ad occhio. 🤭
Il retro del cinturino come descritto con i buchi da cui esce lo schifo spingendo
Vabbé, fa schifo, ma queste sono le mie assolutissime vibe. Ogni tanto è bene raccontare anche queste cose intriganti molto piccole sulla mia vita e il mio destino, così evitiamo preventivamente che boh, eventuali bavosi che si annidano su Internet si fissino in maniera sconveniente su di me. Questo è lo spirito del girlrotting e… in effetti, questa è una delle applicazioni pratiche non troppo dannose di esso: non potrò permettermi di farmi crescere la muffa sugli arti, ma un pochino di essi in spirito viene comunque via e diventa schifo, in un miscuglio di pelle morta, acqua sporca e sali minerali… ❤️
Il retro del cinturino visto in largo, si notano chiazze di sporco sui bordi e leggero sporco nei buchini
#MiBand #schifo #sporco #wristband




in reply to tfowinder

That's actually great. When I'm in school, I do all of my things on a laptop (except for turning on hotspot on my phone since the WiFi there is shit).


September 1925

Our look at some of the significant happenings 100 years ago this month.


3. The Second International Conference on the Standardization of Medicine was held in Geneva, with the goal of standardizing drug formulae worldwide.

7. Born. Laura Ashley, Welsh designer (d.1985)

13. Born. Mel Tormé, jazz singer, in Chicago (d.1999)

16. Born. Charles Haughey, Taoiseach of Ireland; in Castlebar (d.2006)


#1925 #blog #history #otd #September #zenmischief



RyzenZPilot - Intelligent Power Management for AMD Ryzen


🚀 RyzenZPilot
⚡ Your intelligent autopilot for AMD Ryzen performance & efficiency! 🎯
🔥 Your all-in-one solution for dynamic power management – right from your system tray! 💪

Boost your productivity and save energy: RyzenZPilot automatically switches between optimized power profiles based on your active applications. Whether gaming 🎮, video editing 🎬, or office work 📊 – your Ryzen system always runs in the perfect mode!

🤖 What is RyzenZPilot?
RyzenZPilot integrates intelligent power management functionality to enhance productivity and efficiency for AMD Ryzen users. It allows automatic power profile switching based on active processes, manages system performance dynamically, and provides seamless system tray integration. The tool runs completely in the background and intelligently controls your AMD Ryzen processor's energy settings. 🧠 Forget about manual profile switching in Windows power options – RyzenZPilot monitors your active processes and automatically selects the optimal profile!

⭐ Core Features
System Tray Integration for full power management,

Worker Thread Architecture for region-specific performance optimization, and

Automatic Profile Detection to intelligently switch power modes. This allows for operation that is 100% invisible to other applications.

🎯 Intelligent Autopilot: Automatic switching between "Silent" 🤫, "Balanced" ⚖️, and "Performance" 🔥 profiles
📍 System Tray Integration: Runs invisibly in the taskbar – one click gives you full control!
⚡ Multi-Threading Architecture: Responsive GUI + separate worker thread for optimal system performance
🔧 Easy Configuration: Define which applications trigger which power profiles
🚀 Autostart Options: Starts minimized or visible – exactly as you prefer
🔍 Debug Mode: Advanced analysis tools for power users and developers
💾 Minimal Resource Usage: Runs efficiently in the background without system impact

Free download: tetramatrix.github.io/RyzenZPi…



Why “caffè” may not be “caffè”


Every time I think I finally understand Unicode, it surprises me again. This time, it was a file full of coffee orders that wouldn’t grep for “caffè” - even though the word was clearly there. The culprit? Unicode normalization. Characters like “è” can be

Every time when I think I finally “got” Unicode, I get kicked in the back by this rabbit hole. 😆 However, IMHO it is important to recognise that when moving data and files between operating systems and programs that you’re better off knowing some of the pitfalls. So I’m sharing something I experienced when I transferred a file to my FreeBSD Play-Around notebook. So let’s assume a little story…

It’s late afternoon and you and some friends sit together playing around with BSD. A friend using another operating system collects coffee orders in a little text file to not forget anyone when going to the barista on the other side of the street. He sends the file to you, so at the next meeting you already know the preferences of your friends. You take a look at who wants a caffè:
armin@freebsd:/tmp $ cat orders2.txtMauro: cappuccinoArmin: caffè doppioAnna: caffè shakeratoStefano: caffèFranz: latte macchiatoFrancesca: cappuccinoCarla: latte macchiato
So you do a quick grep just to be very surprised!
armin@freebsd:/tmp $ grep -i caffè orders2.txtarmin@freebsd:/tmp $
Wait, WAT? Why is there no output? We have more than one line with caffè in the file? Well, you just met one of the many aspects of Unicode. This time it’s called “normalization”. 😎

Many characters can be represented by more than one form. Take the innocent “à” from the example above. There is an accented character in the Unicode characters called LATIN SMALL LETTER A WITH GRAVE. But you could also just use a regular LATIN SMALL LETTER A and combine it with the character COMBINING GRAVE ACCENT from the Unicode characters. Both result in the same character and “look” identical, but aren’t.

Let’s see a line with the word “caffè” as hex dump using the first approach (LATIN SMALL LETTER A WITH GRAVE):
\u0063\u0061\u0066\u0066\u00E8\u000Ac a f f è (LF)
Now let’s do the same for the same line using the second approach:
\u0063\u0061\u0066\u0066\u0065\u0300\u000Ac a f f è (LF)
And there you have it, the latter is a byte longer and the two lines do not match up even if both lines are encoded as UTF-8 and the character looks the same!

So obviously just using UTF-8 is not enough and you might encounter files using the second approach. Just to make matter more complicated there are actually four forms of Unicode normalization out there. 😆

  • NFD: canonical decomposition
  • NFC: canonical decomposition followed by canonical composition
  • NFKD: compatible decomposition
  • NFKC: compatible decomposition followed by canonical composition.

For the sake of brevity of this post and your nerves we’ll just deal with the first two and I refer you to this Wikipedia article for the rest.

Normal form C (NFC) is the most widely used normal form and is also defined by the W3C for HTML, XML, and JavaScript. Technically speaking, encoding in Latin1 (or Windows Codepage 1252), for example, is in normal form C, since an “à” or the umlaut “Ö” is a single character and is not composed of combining characters. Windows and the .Net framework also store Unicode strings in Normal Form C. This does not mean that NFD can be ignored. For example, the Mac OSX file system works with a variant of NFD data, as the Unicode standard was only finalized when OSX was designed. When two applications share Unicode data, but normalize them differently, errors and data loss can result.

So how do we get from one form to another in one of the BSD operating systems (also in Linux)? Well, the Unicode Consortium provides a toolset called ICU — International Components for Unicode. The Documentation URL is unicode-org.github.io/icu/ and you can install that in FreeBSD using the command
pkg install icu
After completion of the installation you have a new command line tool called uconv (not to be mismatched with iconv which serves a similar purpose). Using uconv you can transcode the normal forms into each other as well do a lot of other encoding stuff (this tool is a rabbit hole in itself 😎).

Similar to iconv you can specify a “from” and a “to” encoding for input. But you can also specify so-called “transliterations” that will be applied to the input. In its simplest form such a transliteration is something in the form SOURCE-TARGET that specifies the operation. The "any" stands for any input character. This is the way I got the hexdump from above by using the transliteration 'any-hex':
armin@freebsd:/tmp$ echo caffè | uconv -x 'any-hex'\u0063\u0061\u0066\u0066\u00E8\u000A
Instead of hex codes you can also output the Unicode code point names to see the difference between the two forms:
armin@freebsd:/tmp$ echo Caffè | uconv -f utf-8 -t utf-8 -x 'any-nfd' | uconv -f utf-8 -x 'any-name' \N{LATIN CAPITAL LETTER C}\N{LATIN SMALL LETTER A}\N{LATIN SMALL LETTER F}\N{LATIN SMALL LETTER F}\N{LATIN SMALL LETTER E}\N{COMBINING GRAVE ACCENT}\N{<control-000A>}
Now let’s try this for the NFC form:
armin@freebsd:/tmp$ echo Caffè | uconv -f utf-8 -t utf-8 -x 'any-nfc' | uconv -f utf-8 -x 'any-name'\N{LATIN CAPITAL LETTER C}\N{LATIN SMALL LETTER A}\N{LATIN SMALL LETTER F}\N{LATIN SMALL LETTER F}\N{LATIN SMALL LETTER E WITH GRAVE}\N{<control-000A>}
You can also convert from one normal form to another by using a transliteration like 'any-nfd' to convert the input to the normal form D (for decomposed, e.g. LATIN SMALL CHARACTER A + COMBINING GRAVE ACCENT) or 'any-nfc' for the normal form C.

If you want to learn about building your own transliterations, there’s a tutorial at unicode-org.github.io/icu/user… that shows the enormous capabilities of uconv.

Using the 'name' transliteration you can easily discern the various Sigmas here (I’m using sed to split the output into multiple lines):
armin@freebsd:/tmp $ echo '∑𝛴Σ' | uconv -x 'any-name' | sed -e 's/\\N/\n/g'{N-ARY SUMMATION}{MATHEMATICAL ITALIC CAPITAL SIGMA}{GREEK CAPITAL LETTER SIGMA}{<control-000A>}
If you want to get the Unicode character from the name, there are several ways depending on the programming language you prefer. Here is an example using python that shows the German umlaut "Ö":
python -c 'import unicodedata; print(unicodedata.lookup(u"LATIN CAPITAL LETTER O WITH DIAERESIS"))'
The uconv utility is a very mighty thing and every modern programming language (see the Python example above) also has libraries and modules to support handling Unicode data. The world gets connected, but not in ASCII. 😎

reshared this



US poll finds 60 percent of Gen Z voters back Hamas over Israel in Gaza war


in reply to Whostosay

Israel managed to figure out to turn a vicious terrorist group into the good guys.
in reply to BarneyPiccolo

Turns out when people break out of a literal concentration camp to fight back against their oppressor they're ~~freedom fighters~~ terrorists


Chatbots can be manipulated through flattery and peer pressure


Researchers convinced ChatGPT to do things it normally wouldn’t with basic psychology.

Technology Channel reshared this.