NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks
NVIDIA is warning users to activate System Level Error-Correcting Code mitigation to protect against Rowhammer attacks on graphical processors with GDDR6 memory.
Israel's war on Gaza has exposed 'deep divide' within Brics, experts say
As one of the core members of Brics, Delhi has been foundational to the development of the collective.
It has also leveraged its decade-old position in the Non-Aligned Movement (NAM) and now Brics, as well as its proximity to western powers through its growing economy, to stake a claim as a leader of the Global South and an interlocutor with the West.
But under Modi, India has increasingly moved closer to the US, with observers noting that Delhi has sought to clarify that it sees Brics as an economic rather than a geopolitical project.
Delhi has also been seen as insistent on both slowing the expansion of Brics as a means to halt Chinese influence over new members already within its sphere of influence and, therefore, temper what is being interpreted as a group geared to take on western hegemony.
Whereas there has been significant talk of Brics launching its own currency to replace the US dollar, India has shown it has no interest in doing so, opting instead to champion trade among Brics members via their national currencies.
India has also sent weapons to Israel for its war on Gaza, including combat drones and AI weapons, construction workers to replace Palestinian workers, and has refused to endorse an arms embargo on Israel.
Delhi's role has even prompted some observers to advise Washington to consider the Brics as a partner instead of an adversary.
"For some countries, notably South Africa, Brics is also seen as a critical foreign policy component in advancing its ‘South-South’ agenda, which aims to develop deeper bilateral relations with countries from the Global South based on common values and shared historical experiences," Singh adds.
But Singh acknowledges that this agenda has struggled to take shape, by his estimate, because of the inclusion of new initiatives that have detracted from what he describes as the core effort of refining a common agenda towards tackling the international governance system and international financial institutions.
Israel's war on Gaza has exposed 'deep divide' within Brics, experts say
As Brics gears up for its annual summit in Rio de Janeiro next week, the group's reluctance to mobilise against Israel's war on Gaza has left a gaping hole in its credibility as an institution purportedly meant to represent the Global South, experts …Azad Essa (Middle East Eye)
7-Zip v25 File Archiver Released with Performance Gains
7-Zip v25 File Archiver Released with Performance Gains
The latest 7-Zip release speeds up bzip2 by up to 40%, improves ZIP and FAT archive support, and fixes multiple bugs and security vulnerabilities.Bobby Borisov (Linuxiac)
like this
Hey OP, you were released today with performance gains!
Ha, gotchem. The drive by compliment strikes again.
like this
Beyond raw horsepower, 7-Zip quietly tightens its handling of several legacy formats. Support for ZIP, CcPIO, and FAT archives has been refined, smoothing edge-case extractions that previously required third-party tools.
Over the years there was a few .zip archives that 7z could not handle for whatever reason. For these cases I had to use another application, but don't know the reason. And my bad to not keeping copies of these files for future testing.
like this
Anyone have the experience registering a domain name with false personal information?
cross-posted from: lemmy.world/post/32523093
Anyone have the experience registering a domain name with false personal information?
I'm trying to register one but all provider asks for name and address. Anyone have the experience providing false information? Do they really care enough to check your info manually if you don't use your domain name for malicious purposes?
particularly interested in experiences with cloudflare
thanks a lot
EDIT:
reddit.com/r/Domains/comments/…
The issue with using fake details is that you risk getting your account suspended. Also, if your domain gets stolen you've made it impossible to retrieve because you will have to verify your information.
How can a domain get stolen?
Usually, the company you bought the domain from sends a e-mail once a year to ask you to verify the WHOIS information is correct.
It doesn't go any further than that if your just hosting nextcloud, a DNS, a blog.
If the website is used to break the law, then that email is contacted, if the email is non respondant, the email provider is asked for IP adress at the time of the last connection, if ISP: you get contacted, if VPN provider: IP at plan subscription or last connection etc. until they can reach an ISP. Then you get contacted.
What are your summer league overreactions/thoughts?
Summer league is still getting started and I'm curious what y'all are thinking so far.
I haven't watched every game but I have some thoughts myself. I thought Tim Connelly was crazy for drafting another French center but I understand it now, Joan getting 7 blocks in his first game has convinced me that he can replace (and possibly exceed) Gobert in the future. Dilly, TSJ, and Clark were exciting too, the wolves' young core is looking nice especially on defense.
I had higher hopes for pistons' 2nd round pic Chaz Lanier, I'm hoping he gets some better catch-and-shoot looks going forward but those aren't as common in summer league. Ron Holland on the other hand might as well have been LebRon Holland. 28pts 11reb 3stl 4/5 3pt is impressive, especially the improved shooting, I hope it's not a fluke.
Speaking of fluke, all eyes have been on Cooper Flagg and Bronny James. We'll see in a couple hours if Coop can have a better game today, 5/21 from the field is rough though. Bronny was playing lockdown defense too which seems to be his new identity, we'll see if he can keep this up, he could be a rotational player going forward.
Anyways would love to hear what other people are thinking and feeling so far!
[Guide] How to install Home Assistant on Truenas Scale 25.04. With the new Incus virtualization
I struggled quite a while to install HomeAssistant on the new Truenas Scale Incus system because there are no good guides for it. So here is one.
::: spoiler 💾 STEP 1: Create a ZVOL
I gave mine 50GB. Minimum needed is 32GB.
Scroll down and save.
:::
::: spoiler 🛜 STEP 2: Create a network bridge
This step can be skipped if you already have a bridge with DHCP enabled.
I struggled a bit with this and eventually did it on the physical Truenas PC instead of the web interface because trying to enable DHCP kept crashing my webUI and resetting the connection. This is probably the worst documented part of this tutorial and you might need to look this up elsewhere. Make your default ethernet connection part of this bridge.
:::
::: spoiler 🔻 STEP 3: Write HomeAssistant image to Zvol
*Optionally: change link in upcoming bash command with latest KVM (.qcow2) from home-assistant.io/installation…
Open shell
Download the VM image in the shell and unzip it:
cd /tmp
wget https://github.com/home-assistant/operating-system/releases/download/15.2/haos_ova-15.2.qcow2.xz
unxz haos_ova-15.2.qcow2.xz
Now write the VM image to the Zvol you made above. Keep in mind that the zvol is in /dev for some reason, not in /mnt
sudo qemu-img convert -p -O raw haos_ova-15.2.qcow2 /dev/zvol/NAS/HomeAssistant
:::
::: spoiler 📁 STEP 4: Import the ZVOL to Incus
- In TrueNAS UI: Instances → Configuration
- Enable Instances
- Set Default Pool: (pool where zvol was saved. NAS for me.)
- Network Interface: Automatic (bridged) or your LAN bridge
- Save
- In top right click Create Instance
- Name "HomeAssistant" (Or what you want to name it)
- Virtualization method: click VM instead of container
- Upload ISO -> select Volume
- Popup menu: Import Zvols
- Browse the file tree and find your ZVOL. Select 'move' option. Then click Import.
- Now "select volume" popup should have the volume selectable. Select it.
:::
::: spoiler 🎌 STEP 5: Finish the VM settings and run it
- CPU configuration: 2 or 3 (or however many cores you want to give the VM)
- Memory size: 4GB (Min1GB. Can be set lower or higher. Can always be adjusted later)
- Root disk size: Same as volume size the ZVOL had (50GB for me)
- scroll down, Network: untick default network. Select the 'Bridged NIC' option.
- USB devices: If you have a Zigbee stick or HA Skyconnect, tick it.
- Create.
After a few minutes you should be able to find the HomeAssistant VM in your router's dhcp list. Go to that IP but write :8123 at the end. For me it is 192.168.0.150:8123.
If it doesn't show up, consider checking the serial console button of the VM and see if it has any output after restarting it. It can take around 15 seconds for text to show up.
:::
Linux gave me a brand new laptop
I bought a Lenovo laptop, one from the the bargain bin, 11th gen Intel and 8gb soldered RAM
Even if I reinstalled Windows to make sure all the bloatware was removed, it was almost unusable. At boot I was left with only 800mb free memory, and "Lenovo vantage" kept reappearing automatically like malware. (It's a useless electron app that wastes half a gig of ram to show you on screen when you press caps lock, check driver updates and try to upsell you on extended warranty)
At idle the machine was as loud as a jet, with crystal disk mark always complaining "the nvme drive is over 65°C!!" (I'm guessing from the constant swapping)
Battery life was a disaster, 2 hours at idle with no foreground apps open
I thought that it was the CPU too slow for my use and the RAM not enough, so I was planning to spend some hundreds of euro to buy a new laptop with at least 16gb of RAM.
Then I installed cachyos and because I'm masochist I chose hyprland at the "easy" install screen that asks you which of the 19 available DE you prefer.
After a week of suffering trying to understand all the text configuration files for everything (it was a shock, everything needs the terminal) I'm now getting used to it and... It's like I got a brand new laptop??!?
Memory: clean boot now obviously is reversed situation. I don't have only 800mb of free RAM, the whole system uses only 800mb
Temperatures: by default cachyos is set to show the CPU temperature on waybar, and it's always around 40-45° C. The fan is way quieter. At idle they can even stop, before they were like a hair dryer even after a clean boot
Battery life: astounding. I can't believe that I can use it for a whole afternoon. Accidentally fell asleep and when I came back after two hours it lost only 10% (on idle, screen turn off automatically)
Gaming performance: tried only with casual games but with something like tinytopia I get 60fps on ultra when on windows it was choppy on high
like this
Yemen fires missile at Zionist regime yet another time
Yemen fires missile at Zionist regime yet another time
TEHRAN, Jul. 06 (MNA) – Local media in the occupied Palestinian lands reported on Sunday a new missile attack from Yemen which triggered sirens in many regions.Mehr News Agency
like this
ICE budget now bigger than most of the world's militaries
US immigration budget now bigger than most of the world's militaries
Donald Trump wants to inject $150 billion into his immigration crackdown over the next four years.Brendan Cole (Newsweek)
geneva_convenience likes this.
So dumb people who can't do multiplications, but can count months, won't panic.
On a more serious not, most people skim the headline, read "three times" and think
"Wow! There's some work to do!" instead of
"Twelve times!? Then Russia is winning. Wait, Russia is winning?
Why is this newspaper not stating that Russia is winning?
There's no way Ukraine can win with one bullet versus twelve.
Shouldn't this be a giant issue?
Why is there no giant debate on this?
Why is my newspaper demanding a debate on this?
Should Ukraine even continue to risk sending its soldiers to fight a war
where the enemy has twelve times the amount of ammo?"
Rutte is an idiot who made failing upward an art form. Nato should dissolve since it has failed in all it's offical and unofficial purposes.
Bury it next to the Warsaw pact where it belongs.
USAID Leaks: Censorship As Regime Change
USAID Leaks: Censorship As Regime Change
Leaked files show USAID paid Valent Projects to censor critics and spread pro-Western propaganda in Sudan and beyond. Ask ChatGPTKit Klarenberg (USAID Leaks: Censorship As Regime Change)
like this
Poll: Zohran Mamdani's policies are popular with Americans outside New York — even if Mamdani is not
like this
I mean haven't the likes of Chomsky and Cenk been pointing this out for decades? When polling Americans on the issues, they tend to be progressive?
That's in spite of a helluva lot of propaganda that is nonstop, 24/7, in favor of corporations, by the way...
Sunday, July 13, 2025
Share
The Kyiv Independent [unofficial]
This newsletter is brought to you by Medical Bridges.
Medical Supplies for Ukraine’s Hospitals. Partnering for global health equity.
Russia’s war against Ukraine
Smoke billows above the city’s buildings following mass Russian drone and missile strikes in the western Ukrainian city of Lviv on July 12, 2025. (Yuriy Dyachyshyn / AFP via Getty Images)
2 killed, 38 injured as Russia launches missile, drone attacks striking Ukrainian cities far from front line. Russia continued its attacks on western Ukrainian cities overnight on July 12, striking communities far from the front line with drone swarms and missile attacks for the third straight night.
Germany-funded long-range weapons to arrive in Ukraine by late July, general says. German Major General Christian Freuding confirmed that the weapons systems’ initial deliveries are expected by the end of July. The arms will be supplied in a “high triple-digit quantity,” he said.
Trump considering sending new funds to Ukraine for first time since taking office, CBS News reports. The funds could come from the $3.85 billion remaining in Presidential Drawdown Authority from the Biden administration or from frozen Russian assets, current and former U.S. officials said.
Zelensky signals major cabinet reshuffle, calls for defense reforms. Zelensky said Ukraine “requires more positive momentum in relations with the United States, alongside new steps in managing the nation’s defense sector.”
Your contribution helps keep the Kyiv Independent going. Become a member today.
‘Impeccable results’ — New Skynex video shows Ukrainian forces destroying Russian drones with German gun. Filmed in an undisclosed location at an unspecified time, the video published on July 12 shows Ukrainian soldiers shooting down multiple Russian targets with a German-made Skynex air defense system.
‘Cut off the head’ — Ukrainian intelligence accuses ‘Putin’s favorite’ brigade of another war crime. “Cut off the head, impale it on a pike, throw it the f**k away,” says the voice attributed by HUR to a company commander from Russia’s infamous 155th Marine Brigade. The intelligence agency said the order, intercepted on July 10, concerned a Ukrainian prisoner of war (POW).
Ukraine destroys Russian drone unit after Kherson infant killed, child ‘should never have been a target,’ governor says. “Dmytro should never have been a target. I thank our soldiers for their just retribution. No occupier who brought death and destruction to our land will escape punishment,” Kherson Oblast Governor Oleksandr Prokudin said.
Ukrainian doctors transplant organs of deceased girl amid Russian strikes, saving 3 children. “This is a story about humanity, the incredible power of a parent’s decision, and the chance for life even in the most difficult times,” the hospital said in a statement.
Read our exclusives
Analysis: Russia is stepping up attacks. Allies are stepping back. What happens to Ukraine next?
Short of a massive injection of military aid, or crushing sanctions on Moscow, there’s little that Trump could announce that could help Ukraine bring Russia’s full-scale invasion to a swift end on terms favorable to Kyiv.
Photo: Drew Angerer, Saul Loeb, Alexander Nemenov/AFP via Getty Image
Learn more
Ukraine’s top anti-corruption activist faces charges that his team calls political vendetta
Vitaliy Shabunin, the chair of the Anti-Corruption Action Center’s executive board and member of the Armed Forces, was charged with evading military service and fraud — an accusation his team rejects.
Photo: Evgen Kotenko/ Ukrinform/Future Publishing via Getty Images
Learn more
Ukrainians grapple with how to memorialize a war still being fought
While the improvised memorial reflects a public need to honor those killed in the war, designing a permanent monument for a conflict with no clear end presents a unique challenge for urban planners and designers.
Photo: Roman Pilipey/AFP via Getty Images
Human cost of Russia’s war
At least 13 killed, 46 injured in Russian attacks across Ukraine over past day. Russia launched 623 aerial weapons overnight, including 339 Shahed-type drones, various decoy UAVs, and 26 Kh-101 cruise missiles, the Air Force said.
Hungarian foreign fighter killed in Ukraine fighting against Russia, media reports. Benjamin Aser, originally from Hungary, was previously a contracted soldier in the Hungarian Defense Forces.
General Staff: Russia has lost 1,032,690 troops in Ukraine since Feb. 24, 2022. The number includes 1,070 casualties Russian forces suffered just over the past day.
International response
Slovakia seeks EU guarantees on Russian gas phase-out ahead of sanctions deal, Reuters report. While Slovak Prime Minister Robert Fico said the sanctions package itself is not objectionable, his government has blocked the proposal over concerns about a separate EU plan to fully phase out Russian gas imports by 2028.
Polish president-elect urges Ukraine to allow full exhumations of Volyn massacre victims, despite resumed work. Speaking at a ceremony in Chelm marking the 82nd anniversary of the 1943-44 Volyn massacres, Polish President-elect Karol Nawrocki said the victims “do not cry out for revenge, but for a cross, a grave, and memory,” and urged Ukraine to authorize further work across multiple sites.
Former Wagner fighter seeks asylum in Finland after fleeing across Russian border, media reports. The man, identified only as Yevgeny, reportedly served in a Wagner assault unit and fought in eastern Ukraine, including in Bakhmut and around Selydove.
French army chief says Russia sees France as ‘main enemy in Europe’ due to Ukraine support. The head of the French army, General Thierry Burkhard, attributed Russia’s view of Paris as a primary adversary largely to France’s unwavering support for Ukraine since Russia’s full-scale invasion.
Russia blames Western sanctions for collapse of UN food deal. A day earlier, the U.N. announced that the three-year agreement would end on July 22. The deal “will not be renewed” because of disagreements, a source close to the discussions told the AFP.
Russia’s Lavrov cautions West on North Korea security pact. Russian Foreign Minister Sergey Lavrov accused the U.S., South Korea, and Japan of military buildups around North Korea. “We warn against exploiting these ties to build alliances directed against anyone, including North Korea and, of course, Russia.”
In other news
Putin backs ‘zero enrichment’ in new Iran nuclear deal, sources tell Axios. Russia’s position, conveyed to both U.S. President Donald Trump and Iranian officials, marks a notable shift given Russia’s historical public advocacy for Iran’s right to enrich.
The Kyiv Independent delivers urgent, independent journalism from the ground, from breaking news to investigations into war crimes. Your support helps us keep telling the truth. Become a member today.
This newsletter is open for sponsorship. Boost your brand’s visibility by reaching thousands of engaged subscribers. Click here for more details.
Today’s Ukraine Daily was brought to you by Martin Fornusek, Anna Fratsyvir, Olena Goncharova, and Abbey Fenbert.
If you’re enjoying this newsletter, consider joining our membership program. Start supporting independent journalism today.
Share
Putin backs 'zero enrichment' in new Iran nuclear deal, sources tell Axios
Russia's position, conveyed to both U.S. President Donald Trump and Iranian officials, marks a notable shift given Russia's historical public advocacy for Iran's right to enrich.Olena Goncharova (The Kyiv Independent)
One Law to Rule Them All: The Iron Law of Software Performance
One Law to Rule Them All: The Iron Law of Software Performance
A systems-level reasoning model for understanding why optimizations succeed or fail.Abhinav Upadhyay (Confessions of a Code Addict)
do you mean the holy grail of
firstname@gmail.com
or the slightly uncommon
firstnamelastname@gmail.com?
I got firstnamelastname@gmail.com when gmail was still 'invite only'.
The one drawback to that is there is a General in the U.S. Army with my exact name who doesn't understand how email works and apparently gives out my email address as his. I wish I knew what his actual email address was so I could let people know what it is. I bet he's missing out on a lot of VA functions and barber appointments because he couldn't be assed to remember his actual email address.
I have first name lastname too. And tbh… It’s a bit of a curse.
I have 2 swedish people wirh the same name as me give it to whatever websites they sign up for at random.
(I’m pretty sure its two people, but oculd also be one person)
Learn About Climate Change with Stunning Visual Flashcards 🌍📚
🧠 Transform the Way You Learn — Instantly! 🌍 Climate change education has never been this beautiful and impactful.
✨ Printable eco flashcards 📚 Perfect for teachers, students & eco-conscious families 🎨 Elegant design – informative & inspiring 🌱 Learn about real events and global impact
💬 Curious? Drop a comment or DM me – happy to chat!
In eigener Sache: „Established 2023“
Zwei Jahre. 24 Monate. 730 Tage. So lange gibt es diesen Blog – und das nur, weil ich eigentlich nur für mich die Mediatheken durchforste, um Filme zu finden, die etwas riskieren. Filme, die weh tun, irritieren, begeistern, wütend machen. Filme, die nicht glatt gebügelt wurden, Filme für meinen ganz privaten Eskapismus. Ich schreibe darüber, weil sie mich beschäftigen. Weil ich etwas sehe, das nicht untergehen sollte im Strom der Flachware. Und weil ich glaube, dass Filmkritik viel mehr sein kann als Konsumberatung.
In eigener Sache: "Established 2023"
Zwei Jahre. 24 Monate. 730 Tage. So lange gibt es diesen Blog - und das nur, weil ich eigentlich nur für mich die Mediatheken durchforste, um Filme zu finden, die etwas riskieren. Filme, die weh tun, irritieren, begeistern, wütend machen.NexxtPress
Pignio pignatico si rende superpignastico per pignare cose e cosine
L’altro giorno mi è venuta l’idea pazza che più pazza non si può etc etc… solito andazzo. Ma, per quanto l’andazzo sia sempre lo stesso del cazzo, il risultato delle mie macchinazioni è anche stavolta originale, e la primissima versione utilizzabile di esso è già in produzione da ieri sera. Occhi aperti sul nuovissimo gnammifico […]
Grindr and Bumble top the list of the most data-hungry dating apps
- All analyzed dating apps collect your location, name, phone number, photos or videos, user and device IDs, purchase history, and sensitive information such as racial or ethnic data, sexual orientation, pregnancy or childbirth information, disability status, religious or philosophical beliefs, political opinions, genetic information, and biometric data. The most data-hungry dating app is Grindr, which collects 24 data types, followed by Bumble (22), Plenty of Fish (18), Tinder (16), Hinge (15), and Headero (9).
- Dating apps not only collect extensive personal and sensitive information but may also combine this data with information from third parties to enable targeted advertising. Additionally, data collected from your app about you or your device can be shared with data brokers, further increasing your exposure and the risk of your information being used in unexpected ways. This practice is known as ‘tracking’. While all analyzed dating apps (except Headero) collect data for tracking purposes, Bumble is the leader, collecting four data points in total: email address, location, device ID, and advertising data.
- We conducted a survey in the US, asking people about their use of various phone apps, including Bumble. Only 6% of respondents said they currently have Bumble installed on their phone, while 16% reported using it in the past but no longer do. Among those who have tried the app, usage is most popular among the 25–34 age group (32%), followed by 35–44 (28%), 18–24 (21%), and those aged 45+ (19%). Additionally, 60% of current or past Bumble users are male, and 40% are female. The majority of Bumble users, 68%, reside in big cities — while 20% live in small towns and 11% in rural areas. This suggests that while Bumble is aggressive in data collection and tracking, its actual reach remains relatively focused on younger, urban, and male demographics.
- Besides potentially exposing your personal data when using dating apps, there is also a risk of interacting with fake profiles. It is estimated that around 10% of profiles are fake. To put this in perspective, Tinder has about 75 million monthly active users, which amounts to 7.5 million fake profiles. This means there is a very high probability of encountering a fake profile at some point when using dating apps. These profiles are often created with the intent to deceive, scam, or manipulate others, which could lead to financial loss or emotional harm.
- Despite being the most data-hungry dating app and its past controversy over allowing users to filter matches by ethnicity⁵, Grindr is the highest-rated app in the Apple App Store, with a rating of 4.5 out of 5. Other analyzed dating apps are rated between 3.7 and 4.4. Grindr collects more data types than its competitors, including users’ names, email addresses, phone numbers, precise locations, sensitive information, email and text messages, search histories, and 17 additional data types. Nonetheless, Grindr’s high user rating shows that many still value the app’s experience over its data collection practices.
- Headero, the least popular app among those analyzed, recently had a data leak that exposed 352,081 user records, 3,032,001 chat records, and 1,096,904 chat room records. That seems like a lot, considering it has only 100K downloads in the Play Store. While Headero collects just nine data types, it still experienced a large-scale data breach, showing that users should be careful not to share too much information with any dating app and be mindful of conversations in the app, as they may not be as private as you would expect.
List of the most data-hungry dating apps announced - Surfshark
All analyzed popular dating apps collect your location, name, phone number, photos or videos, user and device IDs, purchase history, and other sensitive information.Surfshark
Buongiorno
skariko likes this.
Il problema delle patate - Una storiella nata in Francia e raccontata da Lucio Russo nel suo "Segmenti e bastoncini" per esemplificare il tracollo della prparazione matematica negli studenti della
crosspostato da: poliversity.it/users/macfranc/…
Il problema delle patate - Una storiella nata in Francia e raccontata da Lucio Russo nel suo "Segmenti e bastoncini" per esemplificare il tracollo della prparazione matematica negli studenti della scuolaPer mostrare un esempio del dibattito sul deterioramento dell'insegnamento scientifico, diffuso in termini analoghi in tutto il mondo occidentale, riportiamo la storiella del "problema delle patate", che, nata in Francia, è stata riproposta recentemente in Spagna. [Nota. Il "problema delle patate", ripreso da una rivista spagnola, è stato riproposto in traduzione italiana da Ana Millàn Gasca nel numero marzo-giugno 1996 di "Lettera matematica". Ho abbreviato leggermente il testo. Fine nota.] Si tratta della descrizione delle successive modifiche di un semplice problema di aritmetica.
1960.
Un contadino vende un sacco di patate per 1000 pesetas. Le sue spese di produzione sono i 4/5 del prezzo di vendita. Qual è il suo guadagno?
1970 (insegnamento "tradizionale").
Un contadino vende un sacco di patate per 1000 pesetas. Le sue spese di produzione sono i 4/5 del prezzo di vendita, e cioè 800 pesetas. Qual è il suo guadagno?
1970 (insegnamento "moderno").
Un contadino scambia un insieme P di patate con un insieme M di monete. La cardinalità dell'insieme M è uguale a 1000 e ogni elemento di M vale una peseta. Disegna 1000 grossi punti che rappresentino gli elementi dell'insieme M. L'insieme S delle spese di produzione è un sottoinsieme di M ed è formato da 200 grossi punti in meno di quello dell'insieme M. Rappresenta l'insieme S e rispondi alla domanda seguente: qual è la cardinalità dell'insieme G che rappresenta il guadagno? Disegna G in colore rosso.
1980 (insegnamento "rinnovato").
Un contadino vende un sacco di patate per 1000 pesetas. Le sue spese di produzione sono 800 pesetas e il suo guadagno è di 200 pesetas. Sottolinea la parola "patata" e discutine con il tuo compagno.
1990 (insegnamento "riformato").
Supponendo che degli agricoltori vogliano vendere un sacco di patate per 1000 pesetas, fai un sondaggio per determinare il volume della domanda potenziale di patate nel nostro paese. Completa questa ricerca analizzando gli elementi del problema, mettendo in rapporto gli elementi fra loro e cercando il principio del rapporto fra questi elementi. Per finire, fai una tabella a doppio ingresso, indicando in orizzontale, in alto, i nomi degli elementi citati, e in verticale, in basso, diversi modi di cucinare le patate.
Lucio Russo, Segmenti e bastoncini - Dove sta andando la scuola? - Milano 1998
Car apps: the hidden data exchange
- The most data-hungry car app is Mercedes-Benz, which collects 17 different data types, followed by BMW (14), Volkswagen (13), Toyota (12), Hyundai (12), Honda (11), and Ford (10). These seven apps share a common pattern in their data collection practices: they all collect users’ names, email addresses, phone numbers, user IDs, device IDs, product interaction data, and diagnostic data. Additionally, all except Ford also collect location data. This suggests that many leading automakers are building comprehensive user profiles through their apps, likely to enable and enhance a wide range of connected features. > - However, the collection of location data and personal identifiers raises important privacy concerns, particularly if users are not fully aware of how their information is being used and shared or the potential risks involved.
- In contrast, Audi’s app stands out as the least data-hungry, as it does not collect any user data. Tesla and Nissan also collect relatively little information. Tesla gathers two diagnostic data types and one related to product interaction, while Nissan collects the same data types as Tesla, with the addition of the device ID. This suggests that these manufacturers may be adopting a more privacy-conscious approach, either by limiting the functionality of their apps or by intentionally designing them to operate with minimal data collection.
- BMW is the only analyzed app that collects audio data and a list of contacts from the user’s phone, address book, or social graph. Meanwhile, the Volkswagen app is the only one that collects payment information, such as form of payment, payment card number, or bank account number.
- Major data leaks have occurred in the automotive industry in the past, and the more information companies collect, the greater the potential risk if that data is compromised. For example, Toyota experienced a significant data breach in 2024, exposing 240 GB of sensitive customer information, including names, email addresses, physical addresses, and vehicle data. Another data leak affecting 800,000 electric vehicles happened in 2025 to the German company Volkswagen Group. > - The data was stored in Amazon Cloud and included information on the cars’ location, battery levels, and engine activation and deactivation. The group that exposed the leak confirmed that the amassed data on the vehicles was easily accessible and could be matched to car owners’ personal data.
- In 2024, the global sales of the analyzed car brands totaled 38.1 million vehicles. Toyota led with 10.8 million units sold, followed by Ford (4.5M), Hyundai (4.1M), Honda (3.7M), Volkswagen (3.3M), Nissan (3.3M), BMW (2.5M), Mercedes-Benz (2.4M), Tesla (1.8M), and Audi (1.7M). Considering that most official car apps began appearing in the mid-2010s, there are now potentially tens of millions of car owners who could use these apps.
What your car app really collects
Analysis uncovered what data 10 major car brand apps collect, with Mercedes-Benz’s app leading by gathering 17 different types of user and vehicle data.Surfshark
BBC gains rare access to the Congolese mine powering mobile phones
DR Congo's M23 conflict: BBC gains rare access to the mine powering mobile phones
The US wants rights to DR Congo's minerals, but one vital mine is still in rebel hands.Paul Njie (BBC News)
S'è destra - Redistribuire violenza e non ricchezza
Valerio Renzi on Substack
La destra vince perché, pur non redistribuendo ricchezza, redistribuisce la possibilità di esercitare potere e violenza sul piano simbolico e materiale ad alcune porzioni di popolazione, che creano un blocco sociale trasversale e interclassista poten…Substack
Na ja, vermutlich ist das Industriezeitalter in 200-300 Jahren komplett vorbei, und der Kaputtalismus mit seinem bösartigen tumorhaften Wirtschaftswachstum kollabiert spätestens um 2050, wenn er überhaupt noch so lange durchhält. Interessant ist, wie schlimm die kumulativen Schäden an allen möglichen ökologischen Systemen dieses Planeten bis dahin noch werden. Wenn nur so 50-60% aller Spezies aussterben, stehen die Chancen sehr gut, daß hinreichend viele Menschen den Kollaps überleben, daß die Hominiden nicht aussterben. Wenn wir es so weit eskalieren lassen, daß 90% aller Spezies aussterben, dann verschwinden mit hoher Wahrscheinlichkeit alle ökologischen Nischen für große Landwirbeltiere, und das sind wir dummerweise halt auch. Egal wie es läuft, in 5-10 Millionen Jahren ist die Biosphäre wieder völlig normal, nur halt mit anderen Spezies, die aus den Überlebenden evolvieren.
Um Ameisen würde ich mir keine Sorgen machen, die haben diverse ganz gewaltige Massensterben überlebt. Selbst wenn die meisten Spezies von denen verschwinden, ist das nicht allzu schlimm für die Ameisen insgesamt. Problematisch ist eher, daß die verschwindenden Ameisenspezies alle möglichen Tiere und Pflanzen beeinflussen, und daß sich dort, wo sie verschwinden, andere Spezies breitmachen, die andere Einflüsse auf das lokale Ökosystem haben.
I can't login to the Fediverse Canvas using my PieFed account
I'm trying to login here --> canvas.fediverse.events but can't seem to.
Maybe this helps?
curl 'https://auth.fediverse.events/api/v1/login/step/username' \
-H 'Accept: */*' \
-H 'Accept-Language: en-US,en;q=0.7' \
-H 'Connection: keep-alive' \
-H 'Content-Type: application/json' \
-b 'connect.sid=s%3AyUrOl_jKXQ...removed.for.reasons...2wm7rkbzw5wdkvg2%2Bdzw' \
-H 'Origin: https://auth.fediverse.events' \
-H 'Referer: https://auth.fediverse.events/login?return=%2Finteraction%2F5_Yx..removed..oAld' \
-H 'Sec-Fetch-Dest: empty' \
-H 'Sec-Fetch-Mode: cors' \
-H 'Sec-Fetch-Site: same-origin' \
-H 'Sec-GPC: 1' \
-H 'User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36' \
-H 'sec-ch-ua: "Not)A;Brand";v="8", "Chromium";v="138", "Brave";v="138"' \
-H 'sec-ch-ua-mobile: ?0' \
-H 'sec-ch-ua-platform: "Linux"' \
--data-raw '{"username":"Ek-Hou-Van-Braai","instance":"piefed.social"}'
like this
Don't put a @ on the front, that'll get you to the next step and at that point it will try to send you a PM but it never arrives when I try it.
Sorry 😀
I didn't put a @ there, the UI just shows that, if you look at the cURL request it's just my username
{"username":"Ek-Hou-Van-Braai","instance":"piefed.social"}
Is the big AI job displacement already under way?
Is the big AI job displacement already under way?
The impact of artificial intelligence on employment came into sharp focus this week, writes Brian O'DonovanBrian O'Donovan (RTÉ)
Is the big AI job displacement already under way?
Is the big AI job displacement already under way?
The impact of artificial intelligence on employment came into sharp focus this week, writes Brian O'DonovanBrian O'Donovan (RTÉ)
Analysis of 1.76M Community Notes received by X from January 2021 to March 2025: 90%+ of submitted notes are never published, with many notes “stuck in limbo”
The vast majority of submitted notes – more than 90% – never reach the public. In early 2025, over 17% of English notes and 15% of Spanish notes remained unevaluated. Some were rated “not helpful,” and dismissed. But many are simply never rated at all, leaving them stranded in the system without ever entering a decision pipeline. For a program marketed as fast, scalable, and transparent, these figures should raise serious concerns.
A Deep Dive into X’s Community Notes: An Analysis of English and Spanish Contributions Between 2021 and 2025
The Digital Democracy Institute of the Americas (DDIA) examined how X’s Community Notes system functions across English and Spanish, drawing from over 1.76 million notes submitted globally between 2021 and 2025.DDIA
Mumford & Sons – Babel (2012)
Ormai sono acclamati come rock star, ma guardateli in copertina: più facile scambiarli per impiegati in relax dopolavoristico. O in un gruppo di buskers di classe media, con le custodie degli strumenti appoggiate per strada... Leggi e ascolta...
Drunk & Root
in reply to DeathByBigSad • • •like this
sunzu2 likes this.
Autonomous User
in reply to Drunk & Root • • •like this
sunzu2 likes this.
Drunk & Root
in reply to Autonomous User • • •hansolo
in reply to DeathByBigSad • • •Aside from the Ars Technica article in the xpost, there's a lot of "it depends."
It depends on not just the OS, but if it's a custom image built for Dell or HP or Asus etc. computers, what settings are on, what settings were on by default, what bloatware is pre-installed, etc.
Typically, all MS or Apple really want are to know what apps you have installed, zip code, email address, IP address, crash reports, and possibly keywords they can associate with advertising. That's their baseline wish list, which is all advertising fodder, and depending on your settings, that can quickly expand to "anonymized" (it's not) cookie use, tracking of websites visited, etc.
If you have a custom image (i.e. a Dell specific version of Windows) the laptop manufacturer will look for access to roughly the same data.
With the whole Copilot fiasco, recording things like keystrokes and screenshots really are potentially in play now. But, again, only if you have foolishly installed Copilot and turned that stuff on. And that only after huge public outcry. So there's always a non-zero risk of that, but do your due diligence to know you settings.
Can you strip out bloatware and tighten down Windows to a reasonable degree? Sure. But because MS can and does change system settings without your consent, you might find in 6 months an article about a setting you turned off, that they turned back on and you had no idea.
iamtherealwalrus
in reply to hansolo • • •like this
clove likes this.
Derpgon
in reply to iamtherealwalrus • • •like this
sunzu2 likes this.
Ferk
in reply to DeathByBigSad • • •Since they are closed source, we can't know. We can find out that messages are being sent at certain moments, but not what data is being contained in the messages, communications carrying this sort of data are always encrypted (for obvious reasons).
For legal reasons they often include some vague allusion in the terms of service about collecting information.. but they are never very clear on what data exactly they take when and how, so it's left up to interpretation.
like this
clove likes this.
Autonomous User
in reply to Ferk • • •relic4322
in reply to DeathByBigSad • • •There is so so so much, and they do get caught, and when they do we keep a peek into how invasive they are. As someone who has had to worry about being targeted by intelligence agencies and nation-states, I was completely blindsided by corporate/capitalist surveillance.
for example, look at this action by Meta, where they broke out of security sandboxes and exploited protocols in order to tie your browsing history (even private browsing) back to your identify saved in their databases back in meta land
theregister.com/2025/06/03/met…
the amount of data that is being harvested and sold, and resold, is absurd, and the greater threat is not just that they are exploiting you, its that they dont care who the data gets sold to. Bad actors (criminals, etc) can and will purchase information they can use against you.
So, consider the unintentional ramifications of all that info being harvested and available in addition to the intentional ramifications of hyper greed, and couple that with the amount of available compute and you will see that you do not need to be a person of interest, everyone is a data point that can be and will be exploited.
I would encourage everyone to take their privacy seriously.
Meta pauses mobile port tracking tech on Android after researchers cry foul
Thomas Claburn (The Register)pineapple
in reply to relic4322 • • •It's like they have a team of ex non ethical elite hackers to find security vulnerabilities in everything and exploit everything as much as possible.
DeathByBigSad
in reply to pineapple • • •irotsoma
in reply to relic4322 • • •relic4322
in reply to DeathByBigSad • • •digital-defense.io/
Digital Defense - The ultimate personal security checklist to secure your digital life
digital-defense.iosunzu2
in reply to DeathByBigSad • • •Once windows started reverting my privacy settings on update...
That was enough for me to stop using windows.
Similar incidents with android got to me to de Google.
I don't need prove anything beyond thwee incidents. I am dealing with a threat actor so I act like it.
hexagonwin
in reply to DeathByBigSad • • •not sure about win/mac, but for android yes they do keep record of stuff like what apps are being launched and upload/sync to google account. it's not hidden though.. it is(was) literally available on google account history or something (was about 7 years ago)
regarding keystrokes there was a case of a famous chinese keyboard app doing dubious stuff. not sure if i can say it's on a os level but i'm pretty sure more than a few chinese phones ship with that. citizenlab.ca/2023/08/vulnerab…
“Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network
Jeffrey Knockel (The Citizen Lab)like this
sunzu2 likes this.
communism
in reply to DeathByBigSad • • •Thorned_Rose
in reply to DeathByBigSad • • •like this
sunzu2 likes this.
kaidezee
in reply to DeathByBigSad • • •