What a Weaker US Dollar Means for the Economy
https://www.bloomberg.com/news/articles/2025-05-16/how-a-weaker-us-dollar-affects-the-economy?utm_source=flipboard&utm_medium=activitypub
Posted into Explainers @explainers-bloomberg
From Francesca D'Annunzio: “Due process hasn’t been protected. The process that is set in place in this country that is the basis and foundation of our legal system was not allowed to work.”
texasobserver.org/el-salvador-…
#politics #USpol #Texas #news #immigration #ElSalvador #CECOT #ICE #HumanRights
The Lavon affair was a failed Israeli covert operation, codenamed Operation Susannah, conducted in Egypt in the summer of 1954.
As part of a false flag operation, a group of Egyptian Jews were recruited by Israeli military intelligence to plant bombs inside Egyptian-, US-, and British-owned civilian targets.
This is the story behind the botched plot to sabotage Cairo, deceive the West, and control the Suez Canal — at any cost.
youtube.com/watch?v=xiE25bsLfg…
🕎 🇵🇸 ☮️
#Gaza #Palestine
#Press #News
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
Weather radar picks up over 1 million migrating birds
https://www.popsci.com/environment/birds-on-weather-radar/?utm_source=flipboard&utm_medium=activitypub
Posted into Global Environment News @global-environment-news-PopularScience
Weather radar picks up over 1 million migrating birds | Popular Science
The green splotches weren't rain showers, but migratory birds on their annual journey.Margherita Bassi (Popular Science)
The Nuclear Company raises $46M to develop massive reactor sites
https://techcrunch.com/2025/05/16/the-nuclear-company-raises-46m-to-develop-massive-reactor-sites/?utm_source=flipboard&utm_medium=activitypub
Posted into Startup News @startup-news-Techcrunch
The Nuclear Company raises $46M to develop massive reactor sites | TechCrunch
The Nuclear Company, a nuclear startup, has raised $46 million to develop massive reactor sites, according to an SEC filing.Tim De Chant (TechCrunch)
Today in Labor History, May 16: Romani Resistance Day, commemorating the Roma people who fought the fascists during World War II. The date was chosen due to a Holocaust survivor stating that on 16 May 1944, there was a rebellion of Roma detainees at the Auschwitz Birkenau concentration camp. However subsequent research by the Auschwitz Museum discovered that this date was most likely incorrect. It was actually in early April that a number of Roma prisoners refused orders from the SS to leave to work in Germany. Instead, a Polish prisoner was ordered to make a list of Roma able to work to be transported later. By 2 August 1944, those Roma able to work had been transported elsewhere, when the SS came to take the others to the gas chambers. The prisoners armed themselves with crowbars and fought back, but were eventually overcome and gassed. And in 2024, The European Committee for Social Rights (ECSR) unanimously concluded that Italy was violating the European Social Charter as regards the housing rights of the Roma, 15,000 of whom are currently living in shanty towns on the margins of big cities such as Rome, Milan and Naples.
reuters.com/world/europe/europ…
#workingclass #LaborHistory #nazis #genocide #holocaust #roma #romani #aushwitz #resistance #fascism #rebellion #italy #WorldWarTwo #concentrationcamp
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
This Week in Security: Lingering Spectre, Deep Fakes, and CoreAudio
Spectre lives. We’ve got two separate pieces of research, each finding new processor primitives that allow Spectre-style memory leaks. Before we dive into the details of the new techniques, let’s quickly remind ourselves what Spectre is. Modern CPUs use a variety of clever tricks to execute code faster, and one of the stumbling blocks is memory latency. When a program reaches a branch in execution, the program will proceed in one of two possible directions, and it’s often a value from memory that determines which branch is taken. Rather than wait for the memory to be fetched, modern CPUs will predict which branch execution will take, and speculatively execute the code down that branch. Once the memory is fetched and the branch is properly evaluated, the speculatively executed code is rewound if the guess was wrong, or made authoritative if the guess was correct. Spectre is the realization that incorrect branch prediction can change the contents of the CPU cache, and those changes can be detected through cache timing measurements. The end result is that arbitrary system memory can be leaked from a low privileged or even sandboxed user process.
In response to Spectre, OS developers and CPU designers have added domain isolation protections, that prevent branch prediction poisoning in an attack process from affecting the branch prediction in the kernel or another process. Training Solo is the clever idea from VUSec that branch prediction poisoning could just be done from within the kernel space, and avoid any domain switching at all. That can be done through cBPF, the classic Berkeley Packet Filter (BPF) kernel VM. By default, all users on a Linux system can run cBPF code, throwing the doors back open for Spectre shenanigans. There’s also an address collision attack where an unrelated branch can be used to train a target branch. Researchers also discovered a pair of CVEs in Intel’s CPUs, where prediction training was broken in specific cases, allowing for a wild 17 kB/sec memory leak.
Also revealed this week is the Branch Privilege Injection research from COMSEC. This is the realization that Intel Branch Prediction happens asynchronously, and in certain cases there is a race condition between the updates to the prediction engine, and the code being predicted. In short, user-mode branch prediction training can be used to poison kernel-mode prediction, due to the race condition.
(Editor’s note: Video seems down for the moment. Hopefully YouTube will get it cleared again soon. Something, something “hackers”.)
youtube.com/embed/jrsOvaN7PaA?…
Both of these Spectre attacks have been patched by Intel with microcode, and the Linux kernel has integrated patches for the Training Solo issue. Training Solo may also impact some ARM processors, and ARM has issued guidance on the vulnerability. The real downside is that each fix seems to come with yet another performance hit.
Is That Real Cash? And What Does That Even Mean?
Over at the Something From Nothing blog, we have a surprisingly deep topic, in a teardown of banknote validators. For the younger in the audience, there was a time in years gone by where not every vending machine had a credit card reader built-in, and the only option was to carefully straighten a bill and feed it into the bill slot on the machine. Bow how do those machines know it’s really a bill, and not just the right sized piece of paper?
And that’s where this gets interesting. Modern currency has multiple security features in a single bill, like magnetic ink, micro printing, holograms, watermarks, and more. But how does a bill validator check for all those things? Mainly LEDs and photodetectors, it seems. With some machines including hall effect sensors, magnetic tape heads for detecting magnetic ink, and in rare cases a full linear CCD for scanning the bill as it’s inserted. Each of those detectors (except the CCD) produces a simple data stream from each bill that’s checked. Surely it would be easy enough to figure out the fingerprint of a real bill, and produce something that looks just like the real thing — but only to a validator?
In theory, probably, but the combination of sensors presents a real problem. It’s really the same problem with counterfeiting a bill in general: implementing a single security feature is doable, but getting them all right at the same time is nearly impossible. And so with the humble banknote validator.
Don’t Trust That Phone Call
There’s a scam that has risen to popularity with the advent of AI voice impersonation. It usually takes the form of a young person calling a parent or grandparent from jail or a hospital, asking for money to be wired to make it home. It sounds convincing, because it’s an AI deepfake of the target’s loved one. This is no longer just a technique to take advantage of loving grandparents. The FBI has issued a warning about an ongoing campaign using deepfakes of US officials. The aim of this malware campaign seems to be just getting the victim to click on a malicious link. This same technique was used in a LastPass attack last year, and the technique has become so convincing, it’s not likely to go away anytime soon.
AI Searching SharePoint
Microsoft has tried not to be left behind in the current flurry of AI rollouts that every tech company seems to be engaging in. Microsoft’s SharePoint is not immune, and the result is Microsoft Copilot for SharePoint. This gives an AI agent access to a company’s SharePoint knowledge base, allowing users to query it for information. It’s AI as a better search engine. This has some ramifications for security, as SharePoint installs tend to collect sensitive data.
The first ramification is the most straightforward. The AI can be used to search for that sensitive data. But Copilot pulling data from a SharePoint file doesn’t count as a view, making for a very stealthy way to pull data from those sensitive files. Pen Test Partners found something even better on a real assessment. A passwords file hosted on SharePoint was unavailable to view, but in an odd way. This file hadn’t been locked down using SharePoint permissions, but instead the file was restricted from previewing in the browser. This was likely an attempt to keep eyes off the contents of the file. And Copilot was willing to be super helpful, pasting the contents of that file right into a chat window. Whoops.
Fuzzing Apple’s CoreAudio
Googler [Dillon Franke] has the story of finding a type confusion flaw in Apple’s CoreAudio daemon, reachable via Mach Inter-Process Communication (IPC) messages, allowing for potential arbitrary code execution from within a sandboxed process. This is a really interesting fuzzing + reverse engineering journey, and it starts with imagining the attack he wanted to find: Something that could be launched from within a sandboxed browser, take advantage of already available IPC mechanisms, and exploit a complex process with elevated privileges.
Coreaudiod ticks all the boxes, but it’s a closed source daemon. How does one approach this problem? The easy option is to just fuzz over the IPC messages. It would be a perfectly viable strategy, to fuzz CoreAudio via Mach calls. The downside is that the fuzzer would run slower, and have much less visibility into what’s happening in the target process. A much more powerful approach is to build a fuzzing harness that allows hooking directly to the library in question. There is some definite library wizardry at play here, linking into a library function that hasn’t been exported.
The vulnerability that he found was type confusion, where the daemon expected an ioctl object, but could be supplied arbitrary data. As an ioctl object contains a pointer to a vtable, which is essentially a collection of function pointers. It then attempts to call a function from that table. It’s an ideal situation for exploitation. The fix from Apple is an explicit type check on the incoming objects.
Bits and Bytes
Asus publishes the DriverHub tool, a gui-less driver updater. It communicates with driverhub.asus.com using RPC calls. The problem is that it checks for the right web URL using a wildcard, and driverhub.asus.com.mrbruh.com was considered completely valid. Among the functions DriverHub can perform is to install drivers and updates. Chaining a couple of fake updates together results in relatively easy admin code execution on the local machine, with the only prerequisites being the DriverHub software being installed, and clicking a single malicious link. Ouch.
The VirtualBox VGA driver just patched a buffer overflow that could result in VM escape. The vmsvga3dSurfaceMipBufferSize call could be manipulated so no memory is actually allocated, but VirtualBox itself believes a buffer is there and writable. This memory write ability can be leveraged into arbitrary memory read and write capability on the host system.
And finally, what’s old is new again. APT28, a Russian state actor, has been using very old-school Cross Site Scripting (XSS) attacks to gain access to target’s webmail systems. The attack here is JavaScript in an email’s HTML code. That JS then used already known XSS exploits to exfiltrate emails and contacts. The worst part of this campaign is how low-effort it was. These aren’t cutting-edge 0-days. Instead, the target’s email servers just hadn’t been updated. Keep your webmail installs up to date!
like this
The W3C @tag has published the Privacy Principles as a W3C Statement. Privacy is an essential part of the web.
This document provides definitions for privacy and related concepts that are applicable worldwide as well as a set of privacy principles that should guide the development of the web as a trustworthy platform.
People using the web would benefit from a stronger relationship between technology and policy, and this document is written to work with both. #privacy
w3.org/news/2025/privacy-princ…
Greg Abbott signs law to shield publicly traded companies from 'rogue' shareholder lawsuits
Gov. Greg Abbott has signed into law a slate of fresh corporate protections, including provisions making it harder for shareholders to file lawsuits against publicly traded companies, like the one in Delaware that blocked a massive pay package for Tesla Inc. CEO Elon Musk, spurring him to move his companies to Texas.
The Republican governor said the measures would “attract businesses, attract job creators, and will ensure that Texans are going to have plentiful job opportunities to earn a great paycheck for decades to come.”
Under the new litigation law, shareholders could only bring so-called derivative claims that allege wrongdoing by executives if they hold a 3% stake in the company. The law also insulates all corporate directors and officers from most shareholder claims brought in the state’s new business courts, unless it can be proven that they committed fraud or knowingly broke the law. The changes would also shield executive’s emails, texts and other communications from shareholder inspection in most cases.
Abbott signs law to shield companies from 'rogue' shareholder lawsuits
The law aims to stop lawsuits like the one that blocked a massive pay package for Tesla CEO Elon Musk, spurring him to move his companies to Texas.Benjamin Wermund (Houston Chronicle)
Tomorrow is the International Day Against Homophobia, Biphobia and Transphobia - #IDAHOTB
We understand how important it is for queer people to feel safe in the communities they build online. That's why we ensure the Community Guidelines across all of our services prevent hateful and harmful content.
If you see content that doesn't belong, please report it to the server admin. Together, we can make the open social web a home for LGBTQ+ people.
reshared this
Brazil’s Gol Secures $1.9 Billion to Fund Chapter 11 Exit
https://www.bloomberg.com/news/articles/2025-05-16/brazil-s-gol-secures-1-9-billion-to-fund-chapter-11-exit?utm_source=flipboard&utm_medium=activitypub
Posted into Business @business-bloomberg
No, Graduates: AI Hasn't Ended Your Career Before It Starts
https://www.wired.com/story/plaintext-commencement-speech-artificial-intelligence/?utm_source=flipboard&utm_medium=activitypub
Posted into Business @business-WIRED
US military commanders to be told to oust trans troops via medical checks
US military commanders will be told to identify troops in their units who are transgender or have gender dysphoria, then send them to get medical checks in order to force them out of the service.
A senior defense official on Thursday laid out what could be a complicated and lengthy new process aimed at fulfilling Donald Trump’s directive to remove transgender service members from the US military despite years of service alongside all the other two million US troops.
US military commanders to be told to oust trans troops via medical checks
Order follows Pentagon’s announcement to remove 1,000 military members who openly identify as transGuardian staff reporter (The Guardian)
FundMECFS likes this.
Operator
📷 Pentax KX
🎞️ Kodak Tri-X 400
#filmphotography #analogphotography #filmisnotdead #pentax #kodak #kodaktrix #35mmfilm
Trump's 'Good Cop, Bad Cop' Game With Iran
Until just a few weeks ago, a US attack on Iran seemed almost like a done deal. This isn't exactly out of the ordinary for Republican governments, as they tend to be more aggressive toward Tehran, and the Trump administration is no different in that …Anonymous834 (South Front)
HBO’s no good very bad rebrand
Now that Warner Bros. Discovery has renamed its service from Max to HBO Max, and ESPN has just decided on ESPN, The Vergecast hosts debate streaming names.David Pierce (The Verge)
Today in Labor History May 16, 1934: Teamsters initiated a General Strike (5/16-8/21) for union recognition in Minneapolis-St. Paul, Minnesota, which was, then, the main distribution center for the upper Midwest. The worst violence occurred on Bloody Friday, July 20, when police shot at strikers in a downtown truck battle, killing two and injuring 67. Continuing violence lasted throughout the summer. The strike formally ended on August 22. The strike was led by the Trotskyist Communist League of America, which later founded the Socialist Workers Party (United States). While this General Strike was going on in Minneapolis, there was an equally violent General Strike going continuing on San Francisco’s waterfront (5/9-7/31), with much of the West Coast dockers joining them (Everett, WA; Portland, OR; Seattle, WA; and Los Angeles, CA). 9 workers were killed in the West Coast waterfront strikes, along with over 1,000 injuries and over 500 arrests. At the same time, there was also a General Strike going on in Toledo, OH, the Auto Lite Strike (4/12-6/3), in which 2 workers were killed.
#workingclass #LaborHistory #strike #generalstrike #union #minneapolis #sanfrancisco #toledo #police #policebrutality #socialism
Microsoft Fixes Windows Update That Broke GRUB in Dual-Boot Systems
Microsoft finally fixed the GRUB boot issue on dual-boot systems nine months after a Windows update caused widespread Linux boot failures.Bobby Borisov (Linuxiac)
I let lasers power my smart home — and I don’t want to go back
I spent a year charging a smart lock wirelessly using Wi-Charge’s AirCord technology. It worked flawlessly, but it’s expensive and was disruptive to install.Jennifer Pattison Tuohy (The Verge)
Today in Music History May 16, 1953: Romani guitar wizard and jazz legend, Django Reinhardt, died. Reinhardt was the first major jazz talent to emerge from Europe and is still probably the best. He formed the Paris-based Quintette du Hot Club de France in 1934 with violinist Stephane Grappelli. This group was one of the first jazz groups anywhere to feature guitar as a lead instrument. Reinhardt toured briefly with Duke Ellington in 1946. He died unexpectedly of a stroke at age 43. In 1928, he had an accident that left him only able to use his first two fingers on his left hand. This forced him to invent a new technique that allowed him to become even more proficient than he had been prior to the accident. He never learned to read or write music and played completely by ear.
youtube.com/watch?v=vVsC4UNYOH…
#djangoreinhardt #jazz #guitar #roma #romani #france
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
Acer’s Swift Edge laptop is gunning for the MacBook Air
Acer is announcing a boatload of new laptops at the Computex show in Taiwan, like the ultra-light Swift Edge, the Triton 14 AI with RTX 5070 GPU, and more.Antonio G. Di Benedetto (The Verge)
gamberorosso.it/notizie/attual…
Piante e agricoltori potranno finalmente “parlarsi” (e non è uno scherzo)
Una ricerca della Cornell University punta a rivoluzionare l'interazione tra agricoltori e mondo vegetale. Ecco lo studio rivoluzionarioIndra Galbo (Gambero Rosso)
Via libera dall'Europa per il bonus giovani.
Con bonus giovani e donne almeno 100mila assunzioni stabili. A regime nel 2026 oltre 208milioni per donne, 682,5 per giovani. Con i bonus giovani e donne sarà possibile a regime assumere almeno 100mila persone a tempo indeterminato ma il numero potrebbe essere largamente superiore a fronte di assunzioni part time o con contratti che non..
#assunzioni #bonusgiovani #commissioneeuropea #ministerolavoro #Zonaeconomicaspeciale
neptube.io/w/1N3yaDi7sjgVdKhpz…
16 May 1936 | French Jewish girl, Lina Mendelsohn, was born in Paris.
She was deported to #Auschwitz from Drancy on 17 August 1942. She was murdered in a gas chamber after arrival selection.
reshared this
When Trump took office, the administration set up a tip line for employees to identify and assist in slashing programs focused on diversity, equity, inclusion and accessibility.
Not one of the EPA’s more than 15,000 employees used it, ProPublica learned via a public records request.
propublica.org/article/epa-div…
#News #EPA #Trump #DEI #Diversity #Government
EPA Employees Declined to Report Colleagues Working on DEI Initiatives
The Trump administration set up a tip line for workers to identify and assist in slashing programs focused on diversity, equity, inclusion and accessibility. No one used it.ProPublica
reshared this
Náhuatl and Mayan Language Renaissance Occurring in Mexico
Link: yucatanmagazine.com/mayan-lang…
Discussion: news.ycombinator.com/item?id=4…
Náhuatl and Mayan Language Renaissance Occurring in Mexico
México is home to 68 officially recognized Indigenous languages and is experiencing a remarkable Mayan language renaissanceCarlos Rosado van der Gracht (Yucatán Magazine)
Apple Music’s new transfer tool simplifies switching from other streaming services
Apple has introduced a new transfer tool for those wanting to switch to Apple Music without rebuilding their libraries from scratch.Andrew Liszewski (The Verge)
Unidentified Artist
c. 1903
harvardartmuseums.org/collecti…
#Art #Design #Museum #Gallery #MastodonArt #MastoArt #Culture #Random
Ransomware gang members increasingly use a new malware called Skitnet ("Bossnet") to perform stealthy post-exploitation activities on breached networks.
For the tech founders of a startup, choosing a technology to run with can be difficult. My approach is to try to use the stack that has a good balance between features (for your use case) and accessibility; by that I mean, your skillset. If you're thinking of using C# - here's an interesting account of a startup's journey adopting the language from the beginning.
#dotnet #csharp #startup #tech #softwaredevelopment
devblogs.microsoft.com/dotnet/…
Why we built our startup in C# - .NET Blog
Tracebit built their B2B SaaS security product using C#.Sam Cox (.NET Blog)
Innenminister Dobrindt verteidigt Migrationskurs
Die neue Bundesregierung hat das Thema Migration zur Priorität erklärt. Innenminister Dobrindt bekräftigt im Bundestag die geplante härtere Gangart. Die Reaktion beim Koalitionspartner SPD bleibt teils verhalten. Von Dietrich Karl Mäurer.
Omolesbobitransfobia, 110 storie nel report 2025 di Arcigay. Piazzoni: "Dilaga il branco, spesso di ispirazione ideologica"
In occasione della Giornata internazionale contro l’omolesbobitransfobia che si celebra il del 17 maggio, Arcigay presenterà il Report sull’omolesbobitransfobia in Italia.Gayburg
🐘🐘 Humpleupagus 🐘🐘
in reply to FreedomPatriot • • •🐘🐘 Humpleupagus 🐘🐘
Unknown parent • • •Jolly Rancher
in reply to 🐘🐘 Humpleupagus 🐘🐘 • • •