Salta al contenuto principale




stasera, allo studio campo boario (roma), proiezione di “male nostro”, di marianna sciveres


.

#AlbertoDAmico #cinema #film #MariannaSciveres #proiezione #StudioCampoBoario #SusannaMotta #TinoFranco #video

Questa voce è stata modificata (5 mesi fa)

reshared this



stasera, allo studio campo boario (roma), proiezione di “male nostro”, di marianna sciveres

slowforward.net/2025/05/16/sta…


stasera, allo studio campo boario (roma), proiezione di “male nostro”, di marianna sciveres


.

#AlbertoDAmico #cinema #film #MariannaSciveres #proiezione #StudioCampoBoario #SusannaMotta #TinoFranco #video



in reply to Jesse

The image shows a screenshot of a Reddit post and its comments. The post, made by user "u/santagrillcheese," is titled "[TOMT] [SHOW] Old nickelodeon show about sam carly and freddy who made a web show called icarly." The post has an "Open" button and a comment asking "Whats it called." The post has received 12 comments and has a score of 0.

The first comment, by user "FnrrfYgmSchnish," reads "...iCarly. Same as the show-within-a-show." This comment has received 11 upvotes.

The second comment, by the original poster "santagrillcheese," says "Dude i literally couldn't care less." This comment has received -3 upvotes.

The post and comments are displayed in a typical Reddit interface with upvote and downvote arrows, a reply button, and a share button. The usernames and timestamps are visible, and the comments are formatted with a gray background.

Provided by @altbot, generated privately and locally using Ovis2-8B

🌱 Energy used: 0.228 Wh





Researching for a script and I turned to the brilliant blog of sorely missed local historian, Alistair Livingston.
Alistair left us some years ago, and the excerpt below was written in 2018*.
We were fooled in the first decade of this century into believing we had it all figured out. Alistair would not be very happy with where we are now.
#sustainability #research #politics #enshittification #climatechange

* edit: double checked the age of the post, doesn't change sentiment!

Questa voce è stata modificata (5 mesi fa)




If you enjoy model railways or gardens, you might want to follow Simon Wood's PeerTube account which features model railways built in gardens:

➡️ @simonwood

If the videos haven't federated to your server yet, you can browse them all at peertube.tv/a/simonwood/videos

I'd especially recommend this video: peertube.tv/w/aHpxipGkV9sWiw8c…

#FeaturedPeerTube #ModelRailways #ModelTrains #Railways #Trains #PeerTube #PeerTubers

FediFollows reshared this.



We did it! One million signatures!! :rainbow_heart:

It is not time to stop, though!

Keep voting to make sure we have enough valid signatures!

eci.ec.europa.eu/043/public/#/…

#lgbt #lgbtq #lgbtqi #eu #europe



🚀 It’s here! The Kinnectd beta launches today! 🎉

Subscribe to the blog to be included.

Already subscribed? Watch your inbox for your exclusive invite to download the app.

#Kinnectd #BetaLaunch #beta #EarlyAccess #SocialMedia #startup #tech #launch #buildinpublic




#gazetadobrasil #jornalismo #noticias #politics China Suspende Compra de Carne de Frango Brasileira Após Foco de Gripe Aviária gazetabrasil.com.br/negocios/2…




🇬🇧 "What we saw yesterday and last night is further proof that Putin is not serious about peace. He has fled," says Starmer.

"It's crucial that we maintain full unity with our allies. We will continue working on this today to make it clear: there must be a ceasefire, but if not, we will act together on sanctions."

in reply to NOELREPORTS 🇪🇺 🇺🇦

for Putin to meet Zelenskyy is to recognize Zelenskyy as a head of state, and thus recognize Ukraine as an independent country. He never will, even if he says he will.





Apple has become the most developer-hostile company to work with as if those same developers aren't the ones driving iPhone sales.

News Flash, Mr. Cook: People don't buy your products for your pretty Calculator app. You're choosing wrong, again.

mastodon.social/@verge/1145114…

in reply to Anuj Ahooja

This is a reminder that no one can own your PWA.

Jon Henshaw reshared this.

in reply to Anuj Ahooja

That’s one of the main reasons why I made my @recollect notes app a PWA. I had zero desire to jump through Apple’s hoops.

It’s still not easy though. I’m continually frustrated with Apple’s slow walk on supporting native-like access that’s been available on Android for a while. Surely , that’s intentional on their part. That said, they did just release a novel version of web push called Declarative Web Push, but there’s still so much missing that I want to use.

Anuj Ahooja reshared this.

in reply to Anuj Ahooja

Developer-hostility *and* user experience degradation. Apple is unrecognizable from the company it once was.

mastodon.social/@Sarahp/114518…


After adding its own billing option on iOS, Apple asks Patreon to move it to an external browser techcrunch.com/2025/05/16/afte…



il regista Fabio Giovinazzo presenta il suo film
LADY COBRA
una killer in blues
(Ita, 2024)

tuttascena1.wordpress.com/2025…

la_r_go* reshared this.



Social media is now fixed for all teens. We can all relax now.

/s

theverge.com/news/668051/tikto…

in reply to Jon Henshaw

Yeah, something that every teen will definitely use (either way most of us set our birthday to 2000)



Watch #FSF executive director Zoë Kooyman, Adullact president François Elie, digital transaction specialist Samy Chapoutot, and IT security specialist Nizar Tlili talk about #SoftwareFreedom challenges in #MachineLearning at 19:00 UTC (20:00 CET) tonight: u.fsf.org/46r


Video. Pro-Palestinian demonstration in Berlin ends with injuries and arrests
https://www.euronews.com/video/2025/05/16/pro-palestinian-demonstration-in-berlin-ends-with-injuries-and-arrests?utm_source=flipboard&utm_medium=activitypub

Posted into Europe News @europe-news-euronews



The first year of free-threaded Python

Link: labs.quansight.org/blog/free-t…
Discussion: news.ycombinator.com/item?id=4…




globalist.it/world/2025/05/16/…

Razzista e disumano



Meno auto elettriche, più ostacoli: il difficile cammino verso il 2030
@motori
🚗 🚗 🚗
ACEA presenta un tracker interattivo per monitorare la mobilità a zero emissioni. Sfide infrastrutturali e obiettivi di decarbonizzazione al 2030.
motori.it/auto-elettriche-in-c…
#motori #auto

Motori - Gruppo Forum reshared this.



cês sabem q eu não sou crítica aos "jeitinhos brasileiros", né? eu acho q como qualquer outra coisa tem lado bom e lado ruim.

mas eu tbm acho a nossa "composição cultural e comportamental" uma hora vai tornar o meme "bad ending - the whole world is now Brazil" realidade.

in reply to Lori

A imagem apresenta uma cena surreal com um grande crucifixo em forma de cruz, com uma figura estilizada em sua base, erguendo-se sobre uma ilha verde. Ao redor, uma cidade se estende até o horizonte, com nuvens e um arco-íris no céu. O texto "BAD ENDING" está em letras maiúsculas brancas no topo, e "THE WHOLE WORLD IS NOW BRAZIL" está em letras maiúsculas brancas na parte inferior. A imagem sugere uma narrativa humorística ou satírica, com uma mensagem que pode ser interpretada como uma crítica ou uma brincadeira sobre a cultura ou características do Brasil.

Fornecido por @altbot, gerado localmente e de forma privada usando Ovis2-8B

🌱 Energia utilizada: 0.166 Wh




"Creative Technology has named Mr Freddy Sim, the younger brother of its late founder and billionaire entrepreneur Sim Wong Hoo, as CEO with effect from Friday (May 16)."

channelnewsasia.com/singapore/…

#Singapore #Companies #Technology






Today in Labor History, May 16: Romani Resistance Day, commemorating the Roma people who fought the fascists during World War II. The date was chosen due to a Holocaust survivor stating that on 16 May 1944, there was a rebellion of Roma detainees at the Auschwitz Birkenau concentration camp. However subsequent research by the Auschwitz Museum discovered that this date was most likely incorrect. It was actually in early April that a number of Roma prisoners refused orders from the SS to leave to work in Germany. Instead, a Polish prisoner was ordered to make a list of Roma able to work to be transported later. By 2 August 1944, those Roma able to work had been transported elsewhere, when the SS came to take the others to the gas chambers. The prisoners armed themselves with crowbars and fought back, but were eventually overcome and gassed. And in 2024, The European Committee for Social Rights (ECSR) unanimously concluded that Italy was violating the European Social Charter as regards the housing rights of the Roma, 15,000 of whom are currently living in shanty towns on the margins of big cities such as Rome, Milan and Naples.

reuters.com/world/europe/europ…

#workingclass #LaborHistory #nazis #genocide #holocaust #roma #romani #aushwitz #resistance #fascism #rebellion #italy #WorldWarTwo #concentrationcamp



Bei der Frage nach einem #AfDVerbot spricht Merz von
„Konkurrentenbeseitigung“ & Innenminister Dobrindt ist auffallend leise.
Konstantinv. Notz macht im #Bundestag deutlich: ein Parteiverbot ist ein zentrales Instrument unserer Verfassung, um unsere Demokratie zu schützen!


youtube.com/watch?v=U7X1kZZnD8…


This Week in Security: Lingering Spectre, Deep Fakes, and CoreAudio


Spectre lives. We’ve got two separate pieces of research, each finding new processor primitives that allow Spectre-style memory leaks. Before we dive into the details of the new techniques, let’s quickly remind ourselves what Spectre is. Modern CPUs use a variety of clever tricks to execute code faster, and one of the stumbling blocks is memory latency. When a program reaches a branch in execution, the program will proceed in one of two possible directions, and it’s often a value from memory that determines which branch is taken. Rather than wait for the memory to be fetched, modern CPUs will predict which branch execution will take, and speculatively execute the code down that branch. Once the memory is fetched and the branch is properly evaluated, the speculatively executed code is rewound if the guess was wrong, or made authoritative if the guess was correct. Spectre is the realization that incorrect branch prediction can change the contents of the CPU cache, and those changes can be detected through cache timing measurements. The end result is that arbitrary system memory can be leaked from a low privileged or even sandboxed user process.

In response to Spectre, OS developers and CPU designers have added domain isolation protections, that prevent branch prediction poisoning in an attack process from affecting the branch prediction in the kernel or another process. Training Solo is the clever idea from VUSec that branch prediction poisoning could just be done from within the kernel space, and avoid any domain switching at all. That can be done through cBPF, the classic Berkeley Packet Filter (BPF) kernel VM. By default, all users on a Linux system can run cBPF code, throwing the doors back open for Spectre shenanigans. There’s also an address collision attack where an unrelated branch can be used to train a target branch. Researchers also discovered a pair of CVEs in Intel’s CPUs, where prediction training was broken in specific cases, allowing for a wild 17 kB/sec memory leak.

Also revealed this week is the Branch Privilege Injection research from COMSEC. This is the realization that Intel Branch Prediction happens asynchronously, and in certain cases there is a race condition between the updates to the prediction engine, and the code being predicted. In short, user-mode branch prediction training can be used to poison kernel-mode prediction, due to the race condition.

(Editor’s note: Video seems down for the moment. Hopefully YouTube will get it cleared again soon. Something, something “hackers”.)

youtube.com/embed/jrsOvaN7PaA?…

Both of these Spectre attacks have been patched by Intel with microcode, and the Linux kernel has integrated patches for the Training Solo issue. Training Solo may also impact some ARM processors, and ARM has issued guidance on the vulnerability. The real downside is that each fix seems to come with yet another performance hit.

Is That Real Cash? And What Does That Even Mean?


Over at the Something From Nothing blog, we have a surprisingly deep topic, in a teardown of banknote validators. For the younger in the audience, there was a time in years gone by where not every vending machine had a credit card reader built-in, and the only option was to carefully straighten a bill and feed it into the bill slot on the machine. Bow how do those machines know it’s really a bill, and not just the right sized piece of paper?

And that’s where this gets interesting. Modern currency has multiple security features in a single bill, like magnetic ink, micro printing, holograms, watermarks, and more. But how does a bill validator check for all those things? Mainly LEDs and photodetectors, it seems. With some machines including hall effect sensors, magnetic tape heads for detecting magnetic ink, and in rare cases a full linear CCD for scanning the bill as it’s inserted. Each of those detectors (except the CCD) produces a simple data stream from each bill that’s checked. Surely it would be easy enough to figure out the fingerprint of a real bill, and produce something that looks just like the real thing — but only to a validator?

In theory, probably, but the combination of sensors presents a real problem. It’s really the same problem with counterfeiting a bill in general: implementing a single security feature is doable, but getting them all right at the same time is nearly impossible. And so with the humble banknote validator.

Don’t Trust That Phone Call


There’s a scam that has risen to popularity with the advent of AI voice impersonation. It usually takes the form of a young person calling a parent or grandparent from jail or a hospital, asking for money to be wired to make it home. It sounds convincing, because it’s an AI deepfake of the target’s loved one. This is no longer just a technique to take advantage of loving grandparents. The FBI has issued a warning about an ongoing campaign using deepfakes of US officials. The aim of this malware campaign seems to be just getting the victim to click on a malicious link. This same technique was used in a LastPass attack last year, and the technique has become so convincing, it’s not likely to go away anytime soon.

AI Searching SharePoint


Microsoft has tried not to be left behind in the current flurry of AI rollouts that every tech company seems to be engaging in. Microsoft’s SharePoint is not immune, and the result is Microsoft Copilot for SharePoint. This gives an AI agent access to a company’s SharePoint knowledge base, allowing users to query it for information. It’s AI as a better search engine. This has some ramifications for security, as SharePoint installs tend to collect sensitive data.

The first ramification is the most straightforward. The AI can be used to search for that sensitive data. But Copilot pulling data from a SharePoint file doesn’t count as a view, making for a very stealthy way to pull data from those sensitive files. Pen Test Partners found something even better on a real assessment. A passwords file hosted on SharePoint was unavailable to view, but in an odd way. This file hadn’t been locked down using SharePoint permissions, but instead the file was restricted from previewing in the browser. This was likely an attempt to keep eyes off the contents of the file. And Copilot was willing to be super helpful, pasting the contents of that file right into a chat window. Whoops.

Fuzzing Apple’s CoreAudio


Googler [Dillon Franke] has the story of finding a type confusion flaw in Apple’s CoreAudio daemon, reachable via Mach Inter-Process Communication (IPC) messages, allowing for potential arbitrary code execution from within a sandboxed process. This is a really interesting fuzzing + reverse engineering journey, and it starts with imagining the attack he wanted to find: Something that could be launched from within a sandboxed browser, take advantage of already available IPC mechanisms, and exploit a complex process with elevated privileges.

Coreaudiod ticks all the boxes, but it’s a closed source daemon. How does one approach this problem? The easy option is to just fuzz over the IPC messages. It would be a perfectly viable strategy, to fuzz CoreAudio via Mach calls. The downside is that the fuzzer would run slower, and have much less visibility into what’s happening in the target process. A much more powerful approach is to build a fuzzing harness that allows hooking directly to the library in question. There is some definite library wizardry at play here, linking into a library function that hasn’t been exported.

The vulnerability that he found was type confusion, where the daemon expected an ioctl object, but could be supplied arbitrary data. As an ioctl object contains a pointer to a vtable, which is essentially a collection of function pointers. It then attempts to call a function from that table. It’s an ideal situation for exploitation. The fix from Apple is an explicit type check on the incoming objects.

Bits and Bytes


Asus publishes the DriverHub tool, a gui-less driver updater. It communicates with driverhub.asus.com using RPC calls. The problem is that it checks for the right web URL using a wildcard, and driverhub.asus.com.mrbruh.com was considered completely valid. Among the functions DriverHub can perform is to install drivers and updates. Chaining a couple of fake updates together results in relatively easy admin code execution on the local machine, with the only prerequisites being the DriverHub software being installed, and clicking a single malicious link. Ouch.

The VirtualBox VGA driver just patched a buffer overflow that could result in VM escape. The vmsvga3dSurfaceMipBufferSize call could be manipulated so no memory is actually allocated, but VirtualBox itself believes a buffer is there and writable. This memory write ability can be leveraged into arbitrary memory read and write capability on the host system.

And finally, what’s old is new again. APT28, a Russian state actor, has been using very old-school Cross Site Scripting (XSS) attacks to gain access to target’s webmail systems. The attack here is JavaScript in an email’s HTML code. That JS then used already known XSS exploits to exfiltrate emails and contacts. The worst part of this campaign is how low-effort it was. These aren’t cutting-edge 0-days. Instead, the target’s email servers just hadn’t been updated. Keep your webmail installs up to date!


hackaday.com/2025/05/16/this-w…




The W3C @tag has published the Privacy Principles as a W3C Statement. Privacy is an essential part of the web.

This document provides definitions for privacy and related concepts that are applicable worldwide as well as a set of privacy principles that should guide the development of the web as a trustworthy platform.

People using the web would benefit from a stronger relationship between technology and policy, and this document is written to work with both. #privacy
w3.org/news/2025/privacy-princ…




Greg Abbott signs law to shield publicly traded companies from 'rogue' shareholder lawsuits


Gov. Greg Abbott has signed into law a slate of fresh corporate protections, including provisions making it harder for shareholders to file lawsuits against publicly traded companies, like the one in Delaware that blocked a massive pay package for Tesla Inc. CEO Elon Musk, spurring him to move his companies to Texas.

The Republican governor said the measures would “attract businesses, attract job creators, and will ensure that Texans are going to have plentiful job opportunities to earn a great paycheck for decades to come.”

Under the new litigation law, shareholders could only bring so-called derivative claims that allege wrongdoing by executives if they hold a 3% stake in the company. The law also insulates all corporate directors and officers from most shareholder claims brought in the state’s new business courts, unless it can be proven that they committed fraud or knowingly broke the law. The changes would also shield executive’s emails, texts and other communications from shareholder inspection in most cases.



Tomorrow is the International Day Against Homophobia, Biphobia and Transphobia - #IDAHOTB

We understand how important it is for queer people to feel safe in the communities they build online. That's why we ensure the Community Guidelines across all of our services prevent hateful and harmful content.

If you see content that doesn't belong, please report it to the server admin. Together, we can make the open social web a home for LGBTQ+ people.

#LGBTQ #Queer #SocialWeb #Mastodon #IDAHOBIT

Questa voce è stata modificata (5 mesi fa)

reshared this



National Archaeological Museum, Athens, Greece.
그리스 고고학 박물관
アテネ国立考古学博物館

#photo #photography #사진 #写真 #Athens #Greece




US military commanders to be told to oust trans troops via medical checks


US military commanders will be told to identify troops in their units who are transgender or have gender dysphoria, then send them to get medical checks in order to force them out of the service.

A senior defense official on Thursday laid out what could be a complicated and lengthy new process aimed at fulfilling Donald Trump’s directive to remove transgender service members from the US military despite years of service alongside all the other two million US troops.




Trump’s ‘Good Cop, Bad Cop’ Game With Iran southfront.press/trumps-good-c…


HBO’s no good very bad rebrand theverge.com/the-vergecast/668… #Entertainment #Streaming #Vergecast #Podcasts #Android #Google #Apple #Tech


Today in Labor History May 16, 1934: Teamsters initiated a General Strike (5/16-8/21) for union recognition in Minneapolis-St. Paul, Minnesota, which was, then, the main distribution center for the upper Midwest. The worst violence occurred on Bloody Friday, July 20, when police shot at strikers in a downtown truck battle, killing two and injuring 67. Continuing violence lasted throughout the summer. The strike formally ended on August 22. The strike was led by the Trotskyist Communist League of America, which later founded the Socialist Workers Party (United States). While this General Strike was going on in Minneapolis, there was an equally violent General Strike going continuing on San Francisco’s waterfront (5/9-7/31), with much of the West Coast dockers joining them (Everett, WA; Portland, OR; Seattle, WA; and Los Angeles, CA). 9 workers were killed in the West Coast waterfront strikes, along with over 1,000 injuries and over 500 arrests. At the same time, there was also a General Strike going on in Toledo, OH, the Auto Lite Strike (4/12-6/3), in which 2 workers were killed.

#workingclass #LaborHistory #strike #generalstrike #union #minneapolis #sanfrancisco #toledo #police #policebrutality #socialism



Microsoft Fixes Windows Update That Broke GRUB in Dual-Boot Systems lxer.com/module/newswire/ext_l…


I let lasers power my smart home — and I don’t want to go back theverge.com/tech/663899/wi-ch… #SmartHomeReviews #Reviews #Tech


Today in Music History May 16, 1953: Romani guitar wizard and jazz legend, Django Reinhardt, died. Reinhardt was the first major jazz talent to emerge from Europe and is still probably the best. He formed the Paris-based Quintette du Hot Club de France in 1934 with violinist Stephane Grappelli. This group was one of the first jazz groups anywhere to feature guitar as a lead instrument. Reinhardt toured briefly with Duke Ellington in 1946. He died unexpectedly of a stroke at age 43. In 1928, he had an accident that left him only able to use his first two fingers on his left hand. This forced him to invent a new technique that allowed him to become even more proficient than he had been prior to the accident. He never learned to read or write music and played completely by ear.

youtube.com/watch?v=vVsC4UNYOH…

#djangoreinhardt #jazz #guitar #roma #romani #france



Acer’s Swift Edge laptop is gunning for the MacBook Air theverge.com/news/668200/acers… #Laptops #News #Tech



Interessante sta cosa oh !
gamberorosso.it/notizie/attual…