Broke spaghetti last night while cooking for dinner.
I also threw it against the cabinet to make sure it was done cooking.
I have a toddler so cooking "rules" go out the window for laughter.
I also threw it against the cabinet to make sure it was done cooking.
So you don't have a mouth?
Network Configuration Questions
I am rebuilding my system and I have a few questions related to network set up. I have installed a new Unifi system, set up IoT VLAN and opened port for HA. That part I THINK is right. My questions lie with setting up DuckDNS and Let's Encrypt. I plan on doing more self hosting stuff in the future. Can/Should I be doing things like Dynamic DNS and certificates via an entity outside of HA such as my router or some other container in the "system" or is it better to handle HA's requirements inside of HA itself?
Additionally, in my current config I can only reach the HA brain via the DuckDNS URL. What sort of set up is required to have the unit accessible when the internet is down? Seems with the mobile app it is the URL or nothing. What do I need to be doing for internal access when on local LAN?
I am running it on the HA Blue hardware and I plan to rebuild from scratch if that matters. I am sketchy on the network set up and making sure things are all secure. Bit paranoid lol. So if you have any good set up guides on this portion it would be appreciated. Thanks.
HA doesn't need either of these, but if you want an SSL certificate (to run over HTTPS instead of plain HTTP) it is bound to a domain name, which must be public unless you want to enter in the zone of adding our custom certification authority to each of your devices.
This name is resolved by a public DNS. You asked how to use it when internet is down, in this case a public DNS is not reachable so you need your own on the local network.
The reverse proxy is useful when you have a bunch of web services and you want to protect all of them with HTTPS. Instead of delivering the certificate to each of them, you add the HTTPS layer at your reverse proxy and it queries the servers behind in plain HTTP. The reverse proxy has also the benefit of making handling subdomains easier. So instead of distinguishing the different services because they have a different port number you can have a few ha.my.domain/ and feedreader.my.domain/
If you just have homeassistant and not care of HTTPS the easiest option is to use the local resolution: modern OSes advertise the name of the device on the network and it can be resolved on the .local domain. But, if you configured HTTPS to use name.duckdns.org/ you'll se an error when you try to use name.local/ because your browser sees a mismatch between the name in the certificate and the name that you are trying to connect to. You can always ignore this error and move on, but it mostly defeats the point of HTTPS.
Meta – Du rachat de Limitless à la conquête de l’information en temps réel
Le géant de la technologie ne cache plus ses ambitions. Dans une démarche visant à dominer l’écosystème de l’intelligence artificielle, Meta vient d’annoncer l’acquisition de la startup Limitless, créatrice d’un pendentif connecté dopé à l’IA. Mais ce rachat n’est qu’une pièce du puzzle. Parallèlement à cette expansion matérielle, la firme de Mark Zuckerberg modifie la manière dont nous consommons l’actualité via ses chatbots, soulevant de nouvelles questions sur l’avenir de l’information et de nos données personnelles.
Jusqu’à présent, la stratégie matérielle de Meta reposait essentiellement sur deux piliers, les casques de réalité virtuelle Quest et les lunettes connectées Ray-Ban. L’acquisition de Limitless montre une volonté de diversification. L’entreprise, anciennement connue sous le nom de Rewind, s’était fait connaître avec un logiciel de productivité capable d’enregistrer tout ce qui se passait sur un écran d’ordinateur pour le rendre consultable via un chatbot. Elle a ensuite pivoté vers le matériel avec le « Pendant », un clip microphone Bluetooth conçu pour enregistrer, transcrire et résumer les conversations du quotidien. Dan Siroker, son PDG, a justifié cette fusion en évoquant une vision commune avec Meta, apporter une « superintelligence personnelle » à tous. En rejoignant la division Reality Labs, l’équipe de Limitless ne continuera pas nécessairement à développer son pendentif, mais intégrera son expertise dans la conception des futurs « wearables » (technologies portables) du groupe.
Pour les utilisateurs actuels du pendentif (principalement américains), la nouvelle est en demi-teinte. Si l’entreprise promet de maintenir le support pendant au moins un an, la commercialisation du produit cesse immédiatement. En guise de compensation, les abonnements payants sont supprimés, offrant un accès gratuit aux fonctionnalités premium pour la durée restante du support. Consciente des enjeux de confidentialité, la société permet désormais aux utilisateurs d’exporter ou de supprimer totalement leurs données s’ils ne souhaitent pas suivre l’aventure chez Meta.
Au-delà des lunettes: la guerre des wearables audio
Ce rachat n’est pas anodin. Il confirme que l’industrie tech cherche le facteur de forme idéal pour l’IA, au-delà du smartphone. Les lunettes connectées ne conviennent pas à tout le monde, et le format badge ou pendentif émerge comme une alternative crédible pour l’enregistrement audio passif. L’audio est en effet le terrain de jeu où les modèles d’IA actuels excellent le plus avec la transcription précise et le résumé contextuel. En intégrant la technologie de Limitless, et en s’appuyant sur des recrutements stratégiques comme celui d’Alan Dye, ancien responsable du design chez Apple, Meta prépare le terrain pour une nouvelle gamme d’appareils.
On peut imaginer un futur où les Ray-Ban Meta seraient complétées par des accessoires plus discrets, capables de capturer le contexte sonore de notre vie pour alimenter un assistant personnel omniscient. Meta n’est pourtant pas seul sur ce créneau. Amazon a récemment acquis Bee, une autre startup spécialisée dans les wearables IA et d’autres acteurs tentent de percer, comme le pendentif « Friend ». Mais avec la puissance de frappe de Meta, la compétition devient féroce pour les petits acteurs. Comme le souligne Siroker, le monde a changé. Ce qui semblait être une idée marginale il y a cinq ans est devenu une course inévitable vers le futur.
L’IA pour s’informer – Le pacte avec les médias
Si Meta renforce ses oreilles avec Limitless, l’entreprise soigne aussi son cerveau. L’autre volet important de l’actualité récente du groupe concerne sa gestion de l’information. Après avoir longtemps entretenu des relations tumultueuses avec la presse, elle propose une nouvelle approche, délivrer les actualités de dernière minute directement via son chatbot, Meta AI. Elle a annoncé des partenariats avec plusieurs grandes organisations médiatiques, dont CNN, Fox News, Reuters, et le groupe Le Monde. L’objectif est de permettre à l’IA de fournir des résumés d’événements récents en temps réel, en puisant dans des sources plus diversifiées. La liste des partenaires inclut un spectre large, allant de publications lifestyle comme People à des médias politiquement marqués comme The Daily Caller, reflétant peut-être les affinités de la direction actuelle. Sur le papier, la promesse est séduisante, demander à son assistant IA ce qui se passe dans le monde et obtenir une réponse synthétique et sourcée. Mais l’histoire de Meta avec l’information incite à la prudence.
Le spectre du passé et les risques futurs
Il est difficile d’oublier les précédents échecs de Facebook dans le domaine de l’actualité. De la controverse du module « Trending News » en 2016, accusé de biais humains puis remplacé par un algorithme propageant la désinformation, jusqu’au désastreux pivot vers la vidéo qui a mis à genoux de nombreux éditeurs, le bilan est lourd. Les changements d’algorithmes opaques ont souvent détruit des audiences construites sur plusieurs années, laissant les médias exsangues.
Aujourd’hui, la crainte est que ce nouveau modèle basé sur l’IA ne cannibalise encore davantage le trafic des sites d’information. À l’image des « AI Overviews » de Google, si le chatbot fournit la réponse complète, l’utilisateur n’a plus besoin de cliquer sur le lien source. Pour les éditeurs, c’est le risque de voir leurs contenus ingérés par la boîte noire de l’IA sans retombées économiques directes, hormis le montant du chèque signé pour le partenariat initial.
De plus, confier la synthèse de l’actualité à une IA générative comporte des risques d’hallucinations ou de biais contextuels. Si l’outil est censé offrir quelque chose pour tout le monde, la frontière entre information factuelle et contenu partisan risque de devenir floue, surtout avec un panel de sources aussi hétéroclite.
Un écosystème fermé en construction
En mettant en perspective le rachat de Limitless et les nouveaux partenariats médiatiques, la stratégie de Meta apparaît clairement. L’objectif est de créer un écosystème fermé et autosuffisant. D’un côté, le matériel (lunettes, pendentifs) capture votre réalité immédiate et vos conversations. De l’autre, le logiciel (Meta AI) ingère l’actualité mondiale pour vous la restituer à la demande. Meta ne cherche plus seulement à connecter les gens entre eux, mais à devenir l’interface principale entre l’utilisateur et le monde, qu’il s’agisse de se souvenir d’une conversation privée ou de comprendre un événement géopolitique. Reste à savoir si les utilisateurs accepteront de confier autant de pouvoir, et autant de données, à une seule entité.
Advent Calendar 6
Advent Calendar
Zen Mischief Photographs
This year for our Advent Calendar we have a selection of my photographs from recent years. They may not be technically the best, or the most recent, but they’re ones which, for various reasons, I rather like.Dockside crane, Bristol
© Keith C Marshall, 2013
Click the image for a larger view
Police Complaint Filed Against Israeli Eurovision Songwriter Over Sexual Misconduct
Police complaint filed against Israeli Eurovision songwriter over sexual misconduct
The accuser, an unauthorized resident, claims Israeli musician and songwriter Doron Medalie forced a sexual act on him after impairing his ability to resist.Shay Ringel (Haaretz)
Mount Eerie - Sauna (2015)
Parlare di Phil Elverum è come parlare del Papa, la sua musica è diventata talmente personale che è impossibile sbagliarsi durante l’ascolto di uno dei suoi dischi: disco dopo disco, è giunto ad essere uno dei cantautori americani più importanti della sua generazione... Leggi e ascolta...
Afghanistan says 4 killed in heavy fire exchanges with Pakistani forces
Afghanistan authorities say four civilians have been killed after an exchange of heavy fire with Pakistan’s forces along their shared border, as tensions between the South Asian neighbours escalate after peace talks in Saudi Arabia failed to produce a breakthrough.
The governor of Afghanistan’s Spin Boldak district in the Kandahar province confirmed the deaths on Saturday. Officials from both sides said the clashes broke out late on Friday night, with the two countries accusing one another of opening fire first.
In a post on X, the spokesman for Afghanistan’s Taliban government, Zabihullah Mujahid, said Pakistani forces had “launched attacks towards” the Spin Boldak district, prompting Afghan forces to respond.
Afghanistan says 4 killed in heavy fire exchanges with Pakistani forces
Relations have soured between former allies Afghanistan and Pakistan since the Taliban returned to power in 2021.Al Jazeera
like this
Arab, Muslim nations reject Israel exit-only plan for Gaza Rafah crossing
Gaza mediators Egypt and Qatar, and six other Muslim-majority countries have raised the alarm over Israel’s stated plan for a one-way opening of the Rafah border crossing, which would allow Palestinians to leave their territory, but not to return, and block the entry of humanitarian aid.
It comes as Israel’s genocidal war on Gaza continues unabated, with some 600 violations of the ceasefire in the last seven weeks.
The announcement, which breaches Israeli obligations under the first phase of a United States-led peace plan, was made on Wednesday by an Israeli military unit called the Coordination of Government Activities in the Territories (COGAT), stating that one-way crossing would be allowed with Israeli “security approval” in coordination with Egypt.
Arab, Muslim nations reject Israeli exit-only plan for Gaza Rafah crossing
Ministers slam Israeli breach of truce plan, which ultimately aims to ‘displace Palestinian people from their land’.Al Jazeera Staff (Al Jazeera)
TIL that actor Tim Curry is on a wheelchair since 2012
Tim Curry gives emotional health update after 'paralytic stroke' left him in wheelchair
In his new memoir Vagabond, the Rocky Horror Picture Show legend reflects on the stroke that left him paralysed on one side in 2012.Kitty Chrisp (Metro)
like this
Feddit Un'istanza italiana Lemmy reshared this.
Do we think a VPN ban is nigh?
Kami doesn't like this.
The missing standard library for multithreading in JavaScript
GitHub - W4G1/multithreading: The missing standard library for multithreading in JavaScript (Works in Node.js, Deno, Bun, Web browser)
The missing standard library for multithreading in JavaScript (Works in Node.js, Deno, Bun, Web browser) - W4G1/multithreadingGitHub
I present US Politics in 2025 everybody
Politician: Makes humorous response to ridiculous criticism of how he looks in a photoml user: amEriCA, amIRitE??//??
Berlin: Police can secretly enter homes for state trojan installation
Berlin: Police can secretly enter homes for state trojan installation
To collect data from IT systems, investigators in Berlin can secretly search suspects' rooms. This is in a Police Act amendment.Stefan Krempl (heise online)
Bash scripting question
Hello everyone,
Hoping that this is a good place to post a question about Bash scripting. My wife and I have run into a problem in PhotoPrism where it keeps tagging pictures and videos with similar names together and so the thumbnail and the video do not match. I decided that rather than try to get her iPhone to tweak its naming it's easier to just offload to a directory then rename every file to a UUID before sending to photoprism. I'm trying to write a bash script to simplify this but cannot get the internal loop to fire. The issue appears to be with the 'while IFS= read -r -d '' file; do' portion. Is anyone able to spot what the issue may be?
\#! /bin/bash
echo "This script will rename all files in this directory with unique names. Continue? (Y/N)"
read proceed
if [[ "$proceed" == "Y" ]]; then
echo "Proceed"
#use uuidgen -r to generate a random UUID.
#Currently appears to be skipping the loop entirely. the find command works so issue should be after the pipe.
# Troubleshooting
\#Seems like changing IFS to $IFS helped. Now however it's also pulling others., don't think this is correct.
\#verified that the find statement is correct, its the parsing afterwards that's wrong.
\#tried removing the $'\0' after -d as that is string null in c. went to bash friendly '' based on https://stackoverflow.com/questions/57497365/what-does-the-bash-read-d-do
\#issue definitely appears to be with the while statement
find ./ -type f \( -iname \*.jpg -o -iname \*.png \) | while IFS= read -r -d '' file; do
echo "in loop"
echo "$file"
#useful post https://itsfoss.gitlab.io/post/how-to-find-and-rename-files-in-linux/
#extract the directory and filename
dir=$(dirname "$file")
base=$(basename "$file")
echo "'$dir'/'$base'"
#use UUID's to get around photoprism poor handling of matching file names and apples high collision rate
new_name="$dir/$(uuidgen -r)"
echo "Renaming ${file} to ${new_name}"
#mv "$file" "$new_name" #uncomment to actually perform the rename.
done
echo "After loop"
else
echo "Cancelling"
fi
Your find statement is not creating a variable "file" because it's missing the first part of the for loop. This:
find ./ -type f \( -iname \*.jpg -o -iname \*.png \) | while IFS= read -r -d '' file; do
should be this:
for file in "$(find ./ -type f \( -iname \*.jpg -o -iname \*.png \))"; do
However, the above command would find all files in current and subdirectories. You can just evaluate current context much more simply. I tested the below, it seems to work.
\#! /bin/bash
echo "This script will rename all files in this directory with unique names. Continue? (Y/N)"
read proceed
if [[ "$proceed" == "Y" ]]; then
echo "Proceed"
for file in *.{jpg,JPG,png,PNG}; do
echo "in loop"
echo "$file"
dir=$(dirname "$file")
base=$(basename "$file")
echo "'$dir'/'$base'"
new_name="$dir/$(uuidgen -r)"
echo "Renaming ${file} to ${new_name}"
#mv "$file" "$new_name" #uncomment to actually perform the rename.
done
echo "After loop"
else
echo "Cancelling"
fiYou could also find matching files first, evaluate if anything is found and add a condition to exit if no files are found.
Edit: who the fuck downvoted this, it literally works and the for loop was the issue.
like this
-print0 at the end of the find command. In the read -r -d '' you want to read NUL-separated strings, so you must tell the find command to also use NUL characters between the filenames.
Putin vows oil shipments to India will be ‘uninterrupted’ in defiance of US
Putin vows oil shipments to India will be ‘uninterrupted’ in defiance of US
Narendra Modi says energy security is ‘pillar of the India-Russia partnership’ as two leaders meet in DelhiHannah Ellis-Petersen (The Guardian)
Compulsory spyware app to be installed on every Indian citizen's new phone
(unverified image) The compulsory Indian spyware app indicates why governments hate secure encrypted messenger applications
Messaging like WhatsApp/Signal is outside of the scope of Android (etc) permissions, so access cannot be granted to spy on such content; messages at rest MAY be protected from surveillance by use o…Dropsafe
First NSA started snooping, but I didn't care because it did not affect me.
Then Israel started snooping, but I didn't care because I was not the target.
Then India followed in the footsteps but I didn't speak and instead tacitly supported it.
And then they came for me and there was no one left to speak for me.
Apple Watch, Samsung Galaxy Watch: Am I addicted to my smartwatch?
Apple Watch, Samsung Galaxy Watch: Am I addicted to my smartwatch?
Do they do what they say they do, or are they just making us more stressed?Ruth Clegg (BBC News)
Apple Watch, Samsung Galaxy Watch: Am I addicted to my smartwatch?
Apple Watch, Samsung Galaxy Watch: Am I addicted to my smartwatch?
Do they do what they say they do, or are they just making us more stressed?Ruth Clegg (BBC News)
MIT study finds AI can already replace 11.7% of U.S. workforce
MIT study finds AI can already replace 11.7% of U.S. workforce
Artificial intelligence can already replace 11.7% of the U.S. labor market, across finance, health care and professional services, according to MIT's study.MacKenzie Sigalos (CNBC)
adhocfungus likes this.
The study was conducted using a labor simulation tool called the Iceberg Index, which was created by MIT and Oak Ridge National Laboratory.
"We built an AI and it told us how good AI is."
Look at it this way, AI is simply exposing the deep absurdity of late capitalism. Much of the economy in the West consists of what Graeber called bullshit jobs which are roles that even people performing them struggle to justify. I'd argue these types of jobs are uniquely vulnerable to replacement by AI.
It's because these jobs produce nothing of tangible, material value. Building a bridge or diagnosing an illness requires engagement with physical and ethical reality. You are accountable to laws of physics, to human bodies, to measurable outcomes. That sort of a job is going to require a human in the loop. An AI tool can be helpful for the worker where it could help zero down on a diagnosis for example, but the final decision needs to be made by a person who can be held responsible. There is little chance that AI, in the form we have today, can replace such jobs.
But much of the modern service and knowledge economy operates in a realm of manufactured meaning. Marketing campaigns, branding, corporate compliance, and middle management layers are roles built around persuasion, perception, and bureaucratic performance. They generate what Baudrillard would call simulacra. These are outputs detached from real use-value. AI, as a sophisticated pattern matcher, thrives here precisely because the work was already semantically hollow.
So while capitalism created these roles to absorb surplus labor and sustain consumption, AI now reveals their contingency. The real contradiction here is between value and bullshit. It is between work that sustains society and work that just sustains the system.
I absolutely believe bullshit jobs are threatened by AI, I'm just skeptical about simulations being produced by pro-business private schools that have every incentive to flatter their corporate sponsors. MIT has received over two hundred million dollars of investments from IBM for AI research and is seeking an additional billion dollars to build out its AI campus. They're beneficiaries of the bubble.
They have a lot of incentives to lie, here. It sounds like they just built a simulation to tell them what they wanted to hear.
Mullvad VPN - AND THEN? A film about Chat Control and mass surveillance
Update: On November 26, 2025 the EU Council, after three years, agreed on a common position on Chat Control.
Chat Control is once again back on the menu. In the Council of the EU (the member states), several countries continue to work on new versions of the bill. The latest draft in November 2025 was presented with different branding and different semantics, but it would result in mass surveillance, AI-scanning of private data, ID requirement to use messaging services and – with vague legislative text – risk of mandatory scanning (even for end-to-end-encrypted services) in the future.
As long as the Council refuses to reject the bill (the way the European Parliament did), the Chat Control proposal could still become law – despite violating EU law and fundamental human rights.
To highlight the effects of mass surveillance and remind people of the corrupt history (full story below) behind the Chat Control proposal, we now present the film "And Then?"
Mullvad VPN presents And Then?
Chat Control is back on the menu. To highlight the corruption behind the proposal, Mullvad VPN now presents "And Then?"Mullvad VPN
What risk might I have accidentally exposed my computer to by viewing a pirated streaming site without AV blocking?
I recently wanted to watch something a film and went to one of the first two sites listed on the Reddit's r/Piracy mega thread under it's online streaming section. I normally use an older laptop that I don't care about and have no sensitive info on but wanted to stream to a projector and only my personal laptop had an hdmi port.
I downloaded firefox exclusively to use for piracy streaming but initially forgot to add ublock origin or another AV extension to the browser. When clicking anywhere on the site, a new tab would open that I'd need to close before I could actually engage with the website content (search, play, etc), which had been my experience in the past using online streaming sites. Once, one of the popup tabs opened and immediately started a file download without my permission. I didn't open it and deleted it immediately but have recently been noticing some performance issues on my device Mostly that web pages and their content are slower to load than before and my computer has gotten overwhelmed and frozen a few times - not extremely substantially but enough that I've noticed a difference.
For context: I have a ThinkPad with windows 10 installed and an Intel i5 CPU. My default browser has been Opera for a few months now.
I just checked and the compressed zip file is in my recycling bin (not fully off my computer) and I'm not sure if/how it can affect my device without me ever opening or running its contents. I don't have an antivirus background process on my device aside from the default Microsoft Defender Antivirus that comes with Windows 10.
Is there possibly somewhere I could upload the file to check for malware/scan the file to know what it does (titled "XVlDEOSs_Elena_Frost_IMG_223606" - searching for that title didn't match anything on google)? Is there any chance the file is benign and the performance issues I'm noticing are unrelated to this situation?
TLDR: How concerned should I be about the possibility of a virus on my device from a popup window automatically downloading a zip file I never opened?
Would reinstalling my OS be the main/only possible resolution to a potential virus/worm/malware? I'd really like to avoid that if possible but many of the articles/info I can find about it have inconsistent info about risk and steps to take for resolution.
I don't know much about what kinds of risks I might've exposed my computer to. Any insight would be greatly appreciated!
like this
Youre working at this from the wrong angle.
You dont know how to judge if something bad has happened. You dont know what to do if something bad had happened. You dont know how to recover from something bad that may have happened.
You do know that something has happened because the computer is exhibiting different behavior now.
You cant know what happened and it’s not worth the time for you to develop the skills and tools to understand or even be able to use systems like virustotal et.al. which might provide some insight.
Stop using that computer. Turn it off.
If you don’t know where your data is saved, figure it out. If you determine that you want to save data off that computer, pull the drive and order a usb to sata or m2 adapter, whatever the drive is. Plug the drive into the adapter and attach it to a different computer, copy only what you need.
Do you have a way to reinstall windows? If not, go to massgrave.dev and figure it out then reinstall windows.
Do you have some system for backing up your computers? Go ahead and test it out now. If you don’t have a system, decide on one. It could be as simple as an external drive you plug in once a week and as elaborate as you like.
Now you have recovered from whatever happened and you have a system and toolkit for dealing with it if it happens again.
If you run Linux, you're fine, but if you did you probably already knew this
On Windows, i guess you're fine, probably, maybe, but without AV you're already at right with any normal Internet usage.
I'd just say switch to Linux and be done with the question
Yes it's bait but also there is real science behind it. Sun spots are magnetic knots that are wound up magnetic lines. If the lines snap they could pull huge amounts of charged particles and launch them at earth.
The risk is that if big enough it could strip back the our magnetic field reducing our production from radiation and all the electrical charged particles. This could mean electrical systems are disrupted, destroyed, or even catch fire. In the worst case the amount of radiation could kill millions.
So yeah chances are very low but never 0.
if anyone hasn't seen it in a while LOL
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
The Canningite tradition
As the world returns to 19th-century multipolarity, George Canning’s approach to British foreign policy offers timeless lessons. Great powers must protect the interests of small nations in order to hold sway.
Berlin: Police can secretly enter homes for state trojan installation
cross-posted from: lemmy.zip/post/54414754
In order to monitor encrypted communication, investigators will in future, according to the Senate draft and the Änderungen der Abgeordneten, not only be allowed to hack IT systems but also to secretly enter suspects' apartments.If remote installation of the spyware is technically not possible, paragraph 26 explicitly allows investigators to "secretly enter and search premises" in order to gain access to IT systems. In fact, Berlin is thus legalizing – as Mecklenburg-Western Pomerania did before – state intrusion into private apartments in order to physically install Trojans, for example via USB stick.
Berlin: Police can secretly enter homes for state trojan installation
To collect data from IT systems, investigators in Berlin can secretly search suspects' rooms. This is in a Police Act amendment.Stefan Krempl (heise online)
like this
China’s CO2 Emissions Might Have Finally Peaked
China’s CO2 Emissions Might Have Finally Peaked
China has rapidly become the world leader in renewable energy, but continued coal use means it could take longer for its emissions to declineAndrea Thompson (Scientific American)
like this
reshared this
most universally acceptable video file formats?
For holiday gift I was thinking of making USB/microSDs full of TV/movies. The intended recipients are not tech savvy types. They would be using windows computers, normal TVs etc.
What kind of file formats/encodings would be good to package the files in? What is safe and universally usable? And which ones are to be avoided? I'd like to guarentee they'll play without any fooling around with drivers or software.
And I want them to be as small as possible so that I can fit more stuff.
like this
Avc (h264) 8bits video, with AAC audio, hardcoded subtitles and .mp4 container.
That should be warrantied to work on every dumb device built this or last decade.
Israel Is Quietly Expanding Its Occupation of Gaza Under Cover of “Ceasefire”
cross-posted from: hexbear.net/post/6941781
cross-posted from: news.abolish.capital/post/1165…
For us here in Gaza, this “ceasefire” is a fiction. The bombing has continued as Israel expands its Yellow Line.From Truthout via This RSS Feed.
Gaza gang leader and Israeli collaborator Yasser Abu Shabab has been killed, reports say
cross-posted from: hexbear.net/post/6941728
cross-posted from: news.abolish.capital/post/1167…
Yasser Abu Shabab had become an infamous figure in Gaza over the past two years for his role in collaborating with the Israeli army, looting aid convoys destined for starving Palestinians, and sowing social strife amid the genocide.
From Mondoweiss via This RSS Feed.
Israel rampages towards catastrophe on the West Bank
cross-posted from: hexbear.net/post/6941853
cross-posted from: news.abolish.capital/post/1166…
Trump’s peace plan in Gaza is unacceptable to the Jewish supremacists in Israel’s ruling coalition. Even though it submits Gaza to an American-led occupation, even though it gives Israel a free hand to kill as it pleases, it holds out vague hope for a Palestinian state, at least in words. Their whole programme is to destroy any prospect of a Palestinian homeland.
From In Defence of Marxism via This RSS Feed.
Israel rampages towards catastrophe on the West Bank
Trump’s peace plan in Gaza is unacceptable to the Jewish supremacists in Israel’s ruling coalition. Even though it submits Gaza to an American-led occupation, emarxist.com
'Intellexa Leaks' Reveal Wider Reach of Predator Spyware
cross-posted from: hexbear.net/post/6941726
cross-posted from: news.abolish.capital/post/1168…
Highly invasive spyware from consortium led by a former senior Israeli intelligence official and sanctioned by the US government is still being used to target people in multiple countries, a joint investigation published Thursday revealed.
Inside Story in Greece, Haaretz in Israel, Swiss-based WAV Research Collective, and Amnesty International collaborated on the investigation into Intellexa Consortium, maker of Predator commercial spyware. The "Intellexa Leaks" show that clients in Pakistan—and likely also in other countries—are using Predator to spy on people, including a featured Pakistani human rights lawyer.
“This investigation provides one of the clearest and most damning views yet into Intellexa’s internal operations and technology," said Amnesty International Security Lab technologist Jurre van Bergen.
🚨Intellexa Leaks:"Among the most startling findings is evidence that—at the time of the leaked training videos—Intellexa retained the capability to remotely access Predator customer systems, even those physically located on the premises of its govt customers."securitylab.amnesty.org/latest/2025/...[image or embed]
— Vas Panagiotopoulos (@vaspanagiotopoulos.com) December 3, 2025 at 9:07 PMPredator works by sending malicious links to a targeted phone or other hardware. When the victim clicks the link, the spyware infects and provide access to the targeted device, including its encrypted instant messages on applications such as Signal and WhatsApp, as well as stored passwords, emails, contact lists, call logs, microphones, audio recordings, and more. The spyware then uploads gleaned data to a Predator back-end server.
The new investigation also revealed that in addition to the aforementioned "one-click" attacks, Intellexa has developed "zero-click" capabilities in which devices are infected via malicious advertising.
In March 2024, the US Treasury Department sanctioned two people and five entities associated with Intellexa for their alleged role "in developing, operating, and distributing commercial spyware technology used to target Americans, including US government officials, journalists, and policy experts."
"The proliferation of commercial spyware poses distinct and growing security risks to the United States and has been misused by foreign actors to enable human rights abuses and the targeting of dissidents around the world for repression and reprisal," the department said at the time.
Those sanctioned include Intellexa, its founder Tal Jonathan Dilian—a former chief commander of the Israel Defense Forces' top-secret Technological Unit—his wife and business partner Sara Aleksandra Fayssal Hamou; and three companies within the Intellexa Consortium based in North Macedonia, Hungary, and Ireland.
In September 2024, Treasury sanctioned five more people and one more entity associated with the Intellexa Consortium, including Felix Bitzios, owner of an Intellexa consortium company accused of selling Predator to an unnamed foreign government, for alleged activities likely posing "a significant threat to the national security, foreign policy, or economic health or financial stability of the United States."
The Intellexa Leaks reveal that new consortium employees were trained using a video demonstrating Predator capabilities on live clients. raising serious questions regarding clients' understanding of or consent to such access.
"The fact that, at least in some cases, Intellexa appears to have retained the capability to remotely access Predator customer logs—allowing company staff to see details of surveillance operations and targeted individuals raises questions about its own human rights due diligence processes," said van Bergen.
"If a mercenary spyware company is found to be directly involved in the operation of its product, then by human rights standards, it could potentially leave them open to claims of liability in cases of misuse and if any human rights abuses are caused by the use of spyware," he added.
Dilian, Hamou, Bitzios, and Giannis Lavranos—whose company Krikel purchased Predator spyware—are currently on trial in Greece for allegedly violating the privacy of Greek journalist Thanasis Koukakis and Artemis Seaford, a Greek-American woman who worked for tech giant Meta. Dilian denies any wrongdoing or involvement in the case.
Earlier this week, former Intellexa pre-sale engineer Panagiotis Koutsios testified about traveling to countries including Colombia, Kazakhstan, Kenya, Mexico, Mongolia, the United Kingdom, and Uzbekistan, where he pitched Predator to public, intelligence, and state security agencies.
The new joint investigation follows Amnesty International's "Predator Files," a 2023 report detailing "how a suite of highly invasive surveillance technologies supplied by the Intellexa alliance is being sold and transferred around the world with impunity."
The Predator case has drawn comparisons with Pegasus, the zero-click spyware made by the Israeli firm NSO Group that has been used by governments, spy agencies, and others to invade the privacy of targeted world leaders, political opponents, dissidents, journalists, and others.
From Common Dreams via This RSS Feed.
like this
InformaPirata
in reply to Meow-Misfit • • •A blog requires a platform designed for blogging. Staying within the realm of federated software, the three natural alternatives are:
1) WordPress, which, thanks to the plugin that makes it compatible with Activitypub, has achieved a level of perfect integration with the Fediverse.
2) Ghost, which, federated a few months ago, is not only a blogging platform but is also specifically designed for creating mailing lists based on the Substack model.
3) Writefreely, which, despite being natively federated, is extremely focused on distraction-free writing and therefore has some seriously limiting features.
Friendica
As for Friendica, I'm a huge fan of that software and manage the second-most active instance in the entire Fediverse. I can assure you that I know it well and appreciate all its most important features. But don't be fooled by the fact that some call it macro-blogging software. In fact, if you visit a Friendica account's profile, it's not possible to filter the Timeline of their posts from the Timeline of the posts they've reshared. So, you could virtually create a page like this:
poliverso.org/profile/saio
But you could only do that if you don't share too much other content, otherwise the result would be like this:
poliverso.org/profile/notizie
which would be much more confusing 😅
However, Friendica is a very powerful software that allows you to republish your blog feed, as well as automatically reshare your federated blogs. Here I've listed some very interesting Friendica features for blogging:
poliverso.org/display/0477a01e…
So, to recap, if you want to use Friendica to create your blog, you can: you can create a new account. Remember to define it as a "page account," if possible, but also remember that when you reshare content you like, it will appear on your profile page.
However, if you don't need the full suite of tools that characterize a social media platform, you're better off using WordPress.
Sharkey
We're talking about software with a very nice interface, but it's still a social networking software. Being essentially a fork of Misskey, it also has a section for creating static pages that can be easily viewed from outside the Fediverse, but these pages can't be federated with Activitypub 😭.
Ultimately, it seems even less suitable for creating a blog.
If you absolutely must use a Fediverse social media platform, then you'd be better off going with Friendica!
Hubzilla
PS: There's also a software called Hubzilla, which is compatible with Activitypub, although it has developed its own communication protocol. I'm only mentioning it because it's a feature-rich and well-designed product, but its interface is quite complex and unfriendly, so although I've chosen to mention it, I can't recommend it as an alternative.
Signor Amministratore ⁂
2024-09-19 10:29:52
like this
Poliverso - notizie dal Fediverso ⁂ e Informa Pirata like this.
reshared this
Poliverso - notizie dal Fediverso ⁂ e Informa Pirata reshared this.