Salta al contenuto principale




in reply to tfowinder

"The seven-year-old startup, incubated at IIT Kanpur, has developed a proprietary zinc-bromine-based battery system as an alternative to lithium-ion technology. Called ZincGel, it delivers 80–90% of the energy efficiency of conventional lithium batteries, but at a significantly lower levelized cost of storage, the startup said."


KEA: ”En Gazao la afero estas tre klara kaj akuta”

Kataluna Esperanto-Asocio en aŭgusto faris oficialan komunikon pri la situacio en Gazao, kun la titolo ”Ĉesigu la genocidon”. Libera Folio petis la prezidanton de KEA klarigi, kial la asocio decidis fari deklaron ĝuste pri Gazao, sed ne ekzemple pri la milito en Ukrainio, kiu rekte tuŝas multajn esperantistojn.

liberafolio.org/2025/09/02/kea…



What is the URL for AudioBookBay?


As the title says, I was wondering what the URL is for AudioBookBay. Is it the one that ends in ".lu" ?
in reply to N.E.P.T.R

Seems to be. I like using fmhy.pages.dev to check things like what domain is correct:

fmhy.pages.dev/beginners-guide…

in reply to SqueakySpider

Hey I have a question if you don't mind, fmhy.pages.dev the same as fmhy.net?
Questa voce è stata modificata (6 giorni fa)
in reply to pugnaciousfarter

I believe so - I never know which is the "right" domain- if there is a right domain.
in reply to pugnaciousfarter

pages.dev is a Cloudflare domain. While they resolve to different IPv6 addresses, it still seems likely they point to the same hosted source - pages.dev being the Cloudflare host subdomain from the hoster and fmhy.net being a separate domain pointing to the same thing.




Republicans voted against independent redistricting in 2021




Sports Piracy in 3D


Has anyone here checked the 3D live in the usopen.org page?
usopen.org/en_US/scores/

I must say I was impressed. It is not perfect, but if what you to want to watch is just the sport being played, it might very well meet your needs. Add a little sound to it and I could watch a whole tennis match that way.

That made me think how one could convert any sports event to 3D and stream it. I don't know how many cameras IBM uses for that 3D stream, but a handful of volunteers recording the game with their phones and uploading it to a server that would process it could, in theory, generate a 3D version of the match. Maybe even the cameras of the official stream itself could be enough to create this.

The best part of this is that the 3D stream would be untraceable. It can't be watermarked, it's just the movement of the players and the ball, nothing else. And it also would have a ridiculously low bit rate. You could watch a match in 4K using a 100 kbps stream. You could even customize the assets to remove ads and make the players wear the uniform of your choice.

I'm probably dreaming too much, but a man can dream, right?

in reply to Joejoe582

Usually at these events there are staff who constantly look around for people who might be recording, and they don’t hesitate to kick you out if you’re caught more than once. So it’s possible if you have a decent number of people who are good about being sneaky and have covert equipment, but not easy.

It makes you wonder what will happen when more people start wearing smart AR glasses that can record everything and barely look any different than regular glasses.



How to use PeerTube for Podcasting


Created a guide over the weekend on hosting a podcast with PeerTube. Going with Spotify/YouTube is tempting for many, but they may not have realized how easy/affordable PeerTube has become for hosting and maintaining complete control of a feed.
Questa voce è stata modificata (1 settimana fa)

reshared this

in reply to Paige

So .. I've been making a weekly podcast for over 14 years. For all that time I've had complete control over my own content by hosting all the audio, the transcripts, the website and the RSS feeds on an AWS S3 bucket for a couple of dollars per month.

I submitted the RSS feed to several aggregators like iTunes, Spotify, YouTube and others. There's eBooks, I send out weekly email, post on Mastodon and Lemmy (previously on Xitter and Reddit) and it's included in other podcasts, news broadcasts and magazines.

How is adding PeerTube adding anything except more cost to me? What is the benefit of this that goes beyond people using their preferred podcast player downloading the audio from my own existing platform?

in reply to Onno (VK6FLAB)

I perfectly agree, RSS has always worked, and is federated, in a better way than even activitypub, as pretty much each podcast is on the servers of the owners, and that the clients do the aggregation.
in reply to int32

If you actually read the OP, PeerTube podcasts are ALSO distributed via RSS.
in reply to Onno (VK6FLAB)

It adds video. If you don't care about video, and you already have a system that works, it's probably not for you.

If potentially a new person wanted somewhere to host a podcast, they could do that using PeerTube. Along with all the other video services it offers.

in reply to Onno (VK6FLAB)

This guide outlines how to start a podcast for people who are already running PeerTube.
in reply to Paige

Hello Paige Saunders! I'm a big fan you smarmy kiwi yimby.
Questa voce è stata modificata (6 giorni fa)


Nadler, Pillar of Democratic Party’s Old Guard, Will Retire Next Year


In a recent interview in his downtown Manhattan office, Mr. Nadler, 78, said he hesitated to step aside when he believes that President Trump is threatening the foundations of democracy. But he said he had been persuaded it was time for a changing of the guard.

https://www.nytimes.com/2025/09/01/nyregion/jerrold-nadler-congress-retires.html?unlocked_article_code=1.ik8.mNVO.nNHc5LziH6oQ



A Compact for American Workers to Share This Labor Day








Leda Battisti – Sole, mare, e vento


“L’AIDS ti batte – è velenosa morte”

odesli.co/embed/?url=https%3A%…

#nowplaying #musica #ironia #satira #FediRadio #UnoRadio

in reply to anagrams

il programma usato per condividere post dai client mastodon a WordPress, Non prende i content warning e non prende i link... Altro bug su "enable mastodon apps" plugin WordPress.

Leda Battisti - sole, mare, e vento

LINK:

song.link/it/i/1816126735

#NowPlaying #musica #FediRadio #UnoRadio

Questa voce è stata modificata (1 settimana fa)

in reply to ☆ Yσɠƚԋσʂ ☆

Good, he's not US based.

Dominick Skinner, a Netherlands-based immigration activist, estimates he and a group of volunteers have publicly identified at least 20 ICE officials recorded wearing masks during arrests. He told POLITICO his experts are “able to reveal a face using AI, if they have 35 percent or more of the face visible.”
in reply to ☆ Yσɠƚԋσʂ ☆

"Some Democrats concerned about the masking are pushing for regulations to make it easier to identify law enforcement officials — but they still say they’re uneasy that vigilante campaigns have begun using technology to do it."

Luckily we have Dems clutching their pearls because people have taken action.




House Republicans Investigate Wikipedia Over Alleged Bias




House Republicans Investigate Wikipedia Over Alleged Bias




House Republicans Investigate Wikipedia Over Alleged Bias


reshared this

in reply to wikipediasuckscoop

This is slop. Not necessarily AI generated, but definitely dumbass-generated.

Literally not one ounce of effort. No digging into vague studies Republicans are talking about. No overview of Wikipedia's current policy. No questions posed to someone who knows about Wikipedia and/or government attempts to control the narrative.

It's not even a good thing that the article only tells you the core facts. Too much goes unsaid. No context might as well be a hallucination from an AI for how much it bridges the gap between what you think and what reality contains.

Questa voce è stata modificata (5 giorni fa)
in reply to wikipediasuckscoop

They are just trying to annoy people and micromanage any left leaning or non partisan organization so they give up and just submit to the nazi's.

Don't do it, nothing good comes from giving the nazi's what they want.


in reply to faythofdragons

The closest we can get to that in reality is Singapore. They have built buildings convered with green plants. So far, it had been cost efficient way to cool buildings during summer.



Who is dab.yeet.su


This is such a great music service but I'm wondering who is behind it and why they provide it? It must be costing them something to host the site. Interesting that Cloudflare stats show its biggest user base is India.
in reply to 10x10

It must be costing them


From their Terms:

DAB Music Player does not host any copyrighted content. Our Service acts as a search and streaming interface that connects to publicly available APIs. We do not store or distribute copyrighted material.


When you open the Webbrowser Developer Tools, Network tab, you can see where it streams from.

When I check on a song, it streams it from a CDN of qobuz (qobuz.com).

in reply to Kissaki

I was thinking of the cost of hosting the site rather than paying for the media. Thanks thoigh for the comment about checking the stream source.





[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing method


cross-posted from: programming.dev/post/36708596

Main.
Attackers regularly use SSH (Secure SHell) to compromise systems, e.g., via brute-force attacks, establishing persistence by deploying SSH public keys. This ranges from IoT botnets like Mirai, over loader and dropper systems, to the back-ends of malicious operations. Identifying compromised systems at the Internet scale would be a major break-through for combatting malicious activity by enabling targeted clean-up efforts.

In this paper, we present a method to identify compromised SSH servers at scale. For this, we use SSH's behavior to only send a challenge during public key authentication, to check if the key is present on the system. Our technique neither allows us to access compromised systems (unlike, e.g., testing known attacker passwords), nor does it require access for auditing.

With our methodology used at an Internet-wide scan, we identify more than 21,700 unique systems (1,649 ASes, 144 countries) where attackers installed at least one of 52 verified malicious keys provided by a threat intelligence company, including critical Internet infrastructure. Furthermore, we find new context on the activities of malicious campaigns like, e.g., the 'fritzfrog' IoT botnet, malicious actors like 'teamtnt', and even the presence of state-actor associated keys within sensitive ASes. Comparing to honeypot data, we find these to under-/over-represent attackers' activity, even underestimating some APTs' activities. Finally, we collaborate with a national CSIRT and the Shadowserver Foundation to notify and remediate compromised systems. We run our measurements continuously and automatically share notifications.




[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing method


Main.

Attackers regularly use SSH (Secure SHell) to compromise systems, e.g., via brute-force attacks, establishing persistence by deploying SSH public keys. This ranges from IoT botnets like Mirai, over loader and dropper systems, to the back-ends of malicious operations. Identifying compromised systems at the Internet scale would be a major break-through for combatting malicious activity by enabling targeted clean-up efforts.

In this paper, we present a method to identify compromised SSH servers at scale. For this, we use SSH's behavior to only send a challenge during public key authentication, to check if the key is present on the system. Our technique neither allows us to access compromised systems (unlike, e.g., testing known attacker passwords), nor does it require access for auditing.

With our methodology used at an Internet-wide scan, we identify more than 21,700 unique systems (1,649 ASes, 144 countries) where attackers installed at least one of 52 verified malicious keys provided by a threat intelligence company, including critical Internet infrastructure. Furthermore, we find new context on the activities of malicious campaigns like, e.g., the 'fritzfrog' IoT botnet, malicious actors like 'teamtnt', and even the presence of state-actor associated keys within sensitive ASes. Comparing to honeypot data, we find these to under-/over-represent attackers' activity, even underestimating some APTs' activities. Finally, we collaborate with a national CSIRT and the Shadowserver Foundation to notify and remediate compromised systems. We run our measurements continuously and automatically share notifications.





[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing method


cross-posted from: programming.dev/post/36708596

Main.
Attackers regularly use SSH (Secure SHell) to compromise systems, e.g., via brute-force attacks, establishing persistence by deploying SSH public keys. This ranges from IoT botnets like Mirai, over loader and dropper systems, to the back-ends of malicious operations. Identifying compromised systems at the Internet scale would be a major break-through for combatting malicious activity by enabling targeted clean-up efforts.

In this paper, we present a method to identify compromised SSH servers at scale. For this, we use SSH's behavior to only send a challenge during public key authentication, to check if the key is present on the system. Our technique neither allows us to access compromised systems (unlike, e.g., testing known attacker passwords), nor does it require access for auditing.

With our methodology used at an Internet-wide scan, we identify more than 21,700 unique systems (1,649 ASes, 144 countries) where attackers installed at least one of 52 verified malicious keys provided by a threat intelligence company, including critical Internet infrastructure. Furthermore, we find new context on the activities of malicious campaigns like, e.g., the 'fritzfrog' IoT botnet, malicious actors like 'teamtnt', and even the presence of state-actor associated keys within sensitive ASes. Comparing to honeypot data, we find these to under-/over-represent attackers' activity, even underestimating some APTs' activities. Finally, we collaborate with a national CSIRT and the Shadowserver Foundation to notify and remediate compromised systems. We run our measurements continuously and automatically share notifications.




[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing method


Main.

Attackers regularly use SSH (Secure SHell) to compromise systems, e.g., via brute-force attacks, establishing persistence by deploying SSH public keys. This ranges from IoT botnets like Mirai, over loader and dropper systems, to the back-ends of malicious operations. Identifying compromised systems at the Internet scale would be a major break-through for combatting malicious activity by enabling targeted clean-up efforts.

In this paper, we present a method to identify compromised SSH servers at scale. For this, we use SSH's behavior to only send a challenge during public key authentication, to check if the key is present on the system. Our technique neither allows us to access compromised systems (unlike, e.g., testing known attacker passwords), nor does it require access for auditing.

With our methodology used at an Internet-wide scan, we identify more than 21,700 unique systems (1,649 ASes, 144 countries) where attackers installed at least one of 52 verified malicious keys provided by a threat intelligence company, including critical Internet infrastructure. Furthermore, we find new context on the activities of malicious campaigns like, e.g., the 'fritzfrog' IoT botnet, malicious actors like 'teamtnt', and even the presence of state-actor associated keys within sensitive ASes. Comparing to honeypot data, we find these to under-/over-represent attackers' activity, even underestimating some APTs' activities. Finally, we collaborate with a national CSIRT and the Shadowserver Foundation to notify and remediate compromised systems. We run our measurements continuously and automatically share notifications.








Microsoft-backed hollow-core fiber boffins show speed boost


::: spoiler Abstract

A critical component of optical communications is the availability of a suitable waveguide technology for the transport of electromagnetic waves with low loss over a broad spectral range. In the past four decades, despite extensive research, the attenuation and spectral bandwidth of silica-based optical fibres have remained relatively unchanged, with state-of-the-art fibres offering values of 0.14 dB km^−1^ and 26 THz below 0.2 dB km^−1^, respectively. Here we report a microstructured optical waveguide with unprecedented transmission bandwidth and attenuation, with a measured loss of 0.091 dB km^−1^ at 1,550 nm that remains below 0.2 dB km^−1^ over a window of 66 THz. Instead of a traditional solid glass core, this innovative optical fibre features a core of air surrounded by a meticulously engineered glass microstructure to guide light. This approach not only reduces attenuation and other signal degradation phenomena, but it also increases transmission speeds by 45%. Furthermore, the approach theoretically supports further loss reductions and operation at wavelengths where broader bandwidth amplifiers exist, potentially heralding a new era in long-distance communications as well as remote delivery of laser beams.
:::


::: spoiler Main

The quest for long-distance communication has driven human creativity for centuries, from the use of fire beacons at night in the Old and Middle Ages, to the mechanical optical telegraphs of the Napoleonic era, up to the groundbreaking electric telegraphs of the 1850s. The transmission of the first Morse-coded message across the Atlantic via a sub-sea telegraph cable in 1858 was a monumental achievement that shrank geographical divides and revolutionized communication. The realization in the early twentieth century that modulated radio waves could be reflected by the ionosphere further enhanced communication capabilities, thus enabling long-distance communications even in the absence of a direct connection and of a line of sight. However, the inherent noisiness, unreliability and limited bandwidth of radio wave communication prompted the development of higher-quality cables that could transmit multiple voice calls simultaneously. Heaviside’s coaxial cable, with suitably developed conductive and insulating materials, became the technology that underpinned long-distance transmissions for decades. The transition from coaxial cables to optical fibres marked another notable milestone in communication technology. The pioneering work of Kao and Hockham in the 1960s identified the potential of using purified glass for transmitting modulated optical signals (hence information) to kilometre-scale distances, leading to the development of low-loss optical fibres by Corning in the 1970s. This innovation ushered in the era of digital optical communications, which for the last half a century has formed the backbone of global telecommunication networks and enabled the internet revolution. Is a further step ahead possible?

All these breakthroughs were driven by the primary objective to transmit more information, as either more simultaneous messages and voice calls in the analogue electrical era or more bits per second in the digital age. A second, non-negligible goal has always been the reduction of the attenuation (or ‘loss’) of the transmission medium, to increase the distance that a signal could reach before needing regeneration or amplification. Shannon’s mathematical theory of information linked the two goals: lower attenuation required less amplification; the resulting improvement in the signal-to-noise ratio enabled the system to increase its maximum throughput of information.

Upshifting the frequency of the modulated signal carrier from tens of MHz used in the long-distance electrical coaxial cables to hundreds of THz used in optical communications enabled an increase in information throughput of more than a million times. Simultaneously, optical fibres also presented an ultralow level of attenuation of around 0.15 dB km^−1^, which remained approximately constant over a bandwidth of ~10 THz where optical amplification from erbium-doped fibre amplifiers was available. This was a substantial improvement over coaxial cables, where attenuation was frequency dependent (as √f) and reached much higher values than optical fibres at the top frequencies (for example, ~4.5 dB km^−1^ at 30 MHz in the transatlantic TAT-6 cable).

Despite unrelented progress in the field of optical communications since 1970, the minimum attenuation of silica glass fibres has remained approximately unchanged for more than four decades: from 0.154 dB km^−1^ in 1985 to 0.1396 dB km^−1^ in 2024. The seemingly insurmountable attenuation limit of ~0.14 dB km^−1^ for information-carrying waveguides has so far hindered further breakthroughs in communication systems. It has also forced technology to converge to this relatively narrow frequency range of only 5% of the carrier frequency (10 THz at around 192 THz).

Having failed in many decades to identify and synthetize a more transparent glass than silica, a potential route to further lower the propagation loss of a long-distance communication waveguide is to avoid the scattering and absorptions introduced by the glass and which cause loss of signal power in telecoms fibres. This can be achieved by transmitting electromagnetic radiation in a hollow region rather than through a solid glass core. Theoretical foundations, early loss estimates and first experiments for cylindrical, metal, hollow waveguides pre-dated the development of ultra-pure glass fibres. Experimental works from Bell Labs in the mid-twentieth century with dielectric-coated metallic hollow pipes (WT4) reached losses as low as 0.5 dB km^−1^ at frequencies of 70 GHz and impressive capacities of 476,000 voice channels15. The technology was however discarded in the mid-1970s for installation complexities and techno-economic reasons.

New research in the late 1990s and 2000s investigated the potential for achieving ultralow loss at visible/near-infrared frequencies by transmitting light through hair-thin flexible hollow core fibres (HCFs). These glass-based waveguides could transmit light in an air core, thanks to a periodic ‘holey’ cladding around it that created an out-of-plane photonic bandgap. While such research produced an outstanding new tool for scientific investigations, it failed to attain fibres with attenuation below 1 dB km^−1^ and with adequate modal purity for long-distance communication. It is only with the advent of a second generation of HCFs, guiding light through antiresonances and inhibited coupling effects in sub-wavelength-thick, core-surrounding membranes, and with the introduction of nested tube designs, that the prospect of achieving sub-0.14 dB km^−1^ losses became viable. Over the last 6 years, through improved designs and engineering, loss in these nested or double nested antiresonant nodeless hollow core fibres (NANFs/DNANFs) has decreased by an order of magnitude, reaching near parity with the fundamental attenuation of silica glass telecoms fibres at 1,550 nm, and lower values at both shorter and longer wavelengths.

In this work, we showcase the latest advancements in hollow core DNANF technology and present the first optical waveguide that surpasses conventional optical fibres in both loss and bandwidth simultaneously. With a measured loss of under 0.1 dB km^−1^ across an 18 THz bandwidth, this breakthrough result paves the way for a potential revolution in optical communications, enabling unprecedented data transmission capacities, more energy-efficient optical networks and longer unamplified spans.
:::

Questa voce è stata modificata (1 settimana fa)


[PDF] Over 16,000 compromised servers uncovered using Secure Shell key probing method


Main.

Attackers regularly use SSH (Secure SHell) to compromise systems, e.g., via brute-force attacks, establishing persistence by deploying SSH public keys. This ranges from IoT botnets like Mirai, over loader and dropper systems, to the back-ends of malicious operations. Identifying compromised systems at the Internet scale would be a major break-through for combatting malicious activity by enabling targeted clean-up efforts.

In this paper, we present a method to identify compromised SSH servers at scale. For this, we use SSH's behavior to only send a challenge during public key authentication, to check if the key is present on the system. Our technique neither allows us to access compromised systems (unlike, e.g., testing known attacker passwords), nor does it require access for auditing.

With our methodology used at an Internet-wide scan, we identify more than 21,700 unique systems (1,649 ASes, 144 countries) where attackers installed at least one of 52 verified malicious keys provided by a threat intelligence company, including critical Internet infrastructure. Furthermore, we find new context on the activities of malicious campaigns like, e.g., the 'fritzfrog' IoT botnet, malicious actors like 'teamtnt', and even the presence of state-actor associated keys within sensitive ASes. Comparing to honeypot data, we find these to under-/over-represent attackers' activity, even underestimating some APTs' activities. Finally, we collaborate with a national CSIRT and the Shadowserver Foundation to notify and remediate compromised systems. We run our measurements continuously and automatically share notifications.

Technology Channel reshared this.






In the heart of the Miccosukee, the Native American tribe that shut down Alligator Alcatraz


But the Miccosukee don’t oppose the detention center just because it’s “a showcase of cruelty.” For decades, the tribe has been at the center of several legal disputes that have set precedents for how U.S. courts interpret tribal sovereignty, environmental law, and the taxation of Native Americans. In 1982, for example, the tribe sued the state of Florida for illegal land grabs, resulting in the Florida Indian Land Claims Settlement Act, a law that extinguished land claims in exchange for thousands of acres held in trust. In 2004, they challenged Miami’s pumping of sewage into the Everglades, a case that highlighted the Miccosukee’s role in defending the ecosystem and influenced the national debate on water transfers.

Water has been the focus of many of their conservation efforts. The fragile ecosystem has been altered since the last century by urbanization and agriculture, particularly by the diversion of water from its natural course from Lake Okeechobee, north of the peninsula, to Florida Bay, a process that can take months or years.



"Go to" link for comments stops working when a post has a lot of comments?


For posts that receive a lot comments, e.g. 50~100+

When I turn on notifications for a post, I receive the notifications for new comments but the "Go to" link just takes me to the top of the post, not to the specific comment. (Same problem in both Zen/Firefox browser on computer and Firefox/PWA on Android.)

E.g. piefed.social/notification/115…

Is this just me?

Questa voce è stata modificata (1 settimana fa)
in reply to klu9

Ah.

I fixed this for one type of reply but missed out a different one. It's fixed for all future notifications, now.