Salta al contenuto principale




Dieci naufraghi della Eternity salvati da Aspides nel mar Rosso - Ultima ora - Ansa.it
https://www.ansa.it/sito/notizie/topnews/2025/07/10/dieci-naufraghi-della-eternity-salvati-da-aspides-nel-mar-rosso_6ab22d16-4ce3-4be3-a1cd-1c0593558e8b.html?utm_source=flipboard&utm_medium=activitypub

Pubblicato su ANSA Ultima ora @ansa-ultima-ora-AgenziaAnsa




I migliori sconti dell'Amazon Prime Day su notebook, monitor e accessori gaming
https://www.wired.it/gallery/amazon-prime-day-2025-offerte-gaming/?utm_source=flipboard&utm_medium=activitypub

Pubblicato su Wired Italia @wired-italia-WiredItalia



L'intelligenza artificiale arriva in Parlamento, quali sono e a cosa servono i primi tre prototipi che guideranno il cambiamento
https://www.wired.it/article/intelligenza-artificiale-in-parlamento-quali-sono-e-a-cosa-servono-i-primi-tre-prototipi-norma-mse-depuchat/?utm_source=flipboard&utm_medium=activitypub

Pubblicato su Wired Italia @wired-italia-WiredItalia

Diritti reshared this.



Tutto inizia dalla Siria - Il Post
https://www.ilpost.it/2025/07/10/siria-outpost/?utm_source=flipboard&utm_medium=activitypub

Pubblicato su News @news-ilPost

@News

News reshared this.



#Electro
#Vinyls

Nitsch & Gleinser is a duo consisting of German DJ/producer Daniel Nitsch and German producer Christian Gleinser.

doorzo.com/en/mall/mercari/det…



Debatte um Palästinensertuch Kufiya: Shitstorm gegen Gedenkstätte Buchenwald | taz.de

taz.de/Debatte-um-Palaestinens…

> Ein internes Papier stellt palästinensische Symbole unter Antisemitismusverdacht. Der Gedenkstättenleiter verspricht eine Überarbeitung.

in reply to Anja

Entschuldigung, ich konnte dieses Bild nicht verarbeiten.


I've been gifted a very nice Russell Hobbs bread maker.

However, all the recipes that come with it ask for sugar and I'm a bit worried about adding sugar in the amounts asked for in something that kiddo and I will be eating. Kiddo doesn't eat much processed sugar and I try to avoid having too much as well.

Anyone got any low to no sugar bread maker recipes?

#recipes #bakingbread #bakinghelpneeded

in reply to Emily King

I lied!

We use dried yeast, not live yeast... Sorry, I hope that didn't ruin your bread!

Of course, you can use live yeast as well. We've done that before. I'd imagine you'd need more then? The amount of yeast needed also depends on the program of the breadmaker I think, such as temperature and duration of rise-cycle.

@Emily King



#OtD 10 Jul 1917 the Jerome deportation took place in Arizona, when dozens of members of the @iww union were deported to break a strike of IWW miners. More info about the IWW in our podcast: workingclasshistory.com/2018/0…
#otd @iww
in reply to Working Class History

Interesting to see that our current fascist overlords didn't have to tax their few brain cells in order to weaponize immigration into terrorism.


Rural Virginia community defeats massive gas plant and data center proposal

Communities are fighting back against Big Tech and data centers

"Within 48 hours of the meeting with the county development office, yard signs and banners were in the works and residents were making copies of maps to show the extent of Balico’s plan while placing phone calls to county leaders."

appvoices.org/2025/07/09/commu…



The Wayback project, a X11 compatibility layer that allows running X11 desktop environments using Wayland, is now hosted by FreeDesktop.org.
linuxiac.com/wayback-becomes-p…

#wayback #x11 #wayland #opensource



UK police arrest four people, a 20-year-old woman and three men age 17 to 19, in relation to the M&S and Co-op hacks, which started in April and caused havoc (Joe Tidy/BBC)

bbc.com/news/articles/cwykgrv3…
techmeme.com/250710/p20#a25071…



Trump day 170-171: Trump opens investigation into former FBI and CIA directors, wants to take over DC and NY administration, Grok becomes MechaHitler, lights on 24/7 at Alligator Alcatraz, maggots in food and Gor turns out to be Russian: reportersonline.eu/trump-day-1…


Russian drone in Dobropilia


Ordinary day in Dobropilia, Ukraine. People having coffee, shopping, until someone notices a Russian FPV drone circling above the town centre. People run in panic, seeking shelter, while the drone quickly descends and explodes among the shops. Also, please note, most people are screaming in Russian - many people in Ukrainian Donbas are primarily Russian-speaking. This is precisely how Russia's "defense of Russian-speaking population of Donbas" looks like in real life. This narrative is, of course, a lie because speaking Russian language or having Russian origins is not equivalent with the willingness to live in Putin's Russia, as hundreds of thousands fleeing Russia since 2022 testify.


Merz hat eines der ältesten Argumente gegen den Klimaschutz ausgepackt, das zudem auch schon lange entkräftet wurde:

riffreporter.de/de/technik/deu…

Wenn er sich von den Fröschen beraten läßt, ist es kein Wunder, dass er den Sumpf nicht trockenlegen will. 🤷🏻‍♂️

#Klimakatastrophe #KlimakriseISTjetzt



"For months residents on the southeast side of Indianapolis have been fighting a planned data center project in their backyard without knowing the name of their foe, just that it's an anonymous Fortune 100 company."

It's the way Big Tech roll.

They roll in secret.

eu.indystar.com/story/money/20…

Disreputable_Craftsman reshared this.



È pioggia di assoluzioni nella sentenza su Bibbiano: la verità giudiziale smentisce la propaganda della destra gayburg.com/2025/07/e-pioggia-…


Xi calls for global dialogue, cooperation network among civilizations eng.chinamil.com.cn/CHINA_2091…
in reply to Acta Populi

Hey Xi, you really think any other civilization exists beyond the monstrosity of western industrial capitalism? Look all around you, unless you climb the high hills of China, all you see is western industrial capitalist disaster.

And I thought only Trump was dumb!

@actapopuli



Deutlich weniger irreguläre Grenzübertritte in die EU

Die Anzahl der illegalen Einreisen und Einreiseversuche an den EU-Außengrenzen ist nach neuen Zahlen der Grenzschutzbehörde Frontex um ein Fünftel gesunken. Die meisten Menschen kamen demnach über das Mittelmeer.

➡️ tagesschau.de/ausland/europa/f…

#EU #Frontex #Asyl

in reply to tagesschau

ich wüsste gerne dazu wie sich die Anzahl der illegalen pushbacks im gleichen Zeitraum entwickelt hat. Und dann gerne noch die Finanzhilfen für Konzentrationslager in zb Libyen 🤡
in reply to tagesschau

Was soll das sein, ein irregulärer Grenzübertritt? Kein Visum?





We went on a hike today, got muddy, had fun.

(CW the following: dog medical health)
.
.
.
.
.
.
.
This sweet thing has surgery coming up that is necessary for life, but scary due to some other medical issues, which mean she may not wake up.

She'd better fucking wake up.

I'm not crying, you're crying.

#dog #dogs #DogsOfMastodon



Du
brauchst weniger,
als du denkst –
und bist mehr,
als du glaubst…💚



レイス君11歳のお誕生日おめでとう生配信ライブ🎉 moepets.com/1050241/ #50代未婚女性 #dog #dogs #Inu #livingwithadog #miniaturepinscher #minipin #Rehpinscher #アラフィフ #いぬ #シニア犬 #ペット #ミニチュア・ピンシャー #ミニチュアピンシャー #ミニピン #レイス隊長 #わんこ. #丁寧な暮らし #保護犬 #子鹿 #家族 # #犬かわいい #犬と一人暮らし #犬を飼う #犬感動 #犬甘えん坊 #犬癒し動画


E intanto a fatica... l'orto resiste, anche al vento!


Evergreen from Sarah's Scribbles

Source: sarahcandersen.com/post/690306…

reshared this



A lively and convivial launch for a new IHR podcast series on Labour Leaders from Clement Atlee to Jeremy Corbyn by Izzy Conn: Leading Labour. Neil Kinnock, Jonathan Ashworth, Polly Toynbee and Nick Thomas-Symonds joined Philip Murphy and Izzy Conn to reveal, amongst other things, which labour leader they most admired.
New episodes every Tuesday. open.spotify.com/show/2k1Xn50n….


2 days ago I used the last of the cheese during our cheese time. Yesterday I forgot to buy more before cheese time, so there was no cheese.

A heinous crime deserving of life in prison without parole, I know.

Does this redeem me?

#Greyhounds #GreyhoundsOfFediverse #GreyhoundsOfMastodon #Dogs #DogsOfFediverse #DogsOfMastodon #SeniorDogs #FediFido #Leeloo #Cheese #Babybel




Αντιρατσιστική κινητοποίηση στο Σύνταγμα το απόγευμα της Πέμπτης: «Η Κρήτη δεν θα γίνει φυλακή – Άσυλο για όλες και όλους» thepressproject.gr/antiratsist…



From 2004 until 2015, Germany was the global leader in PV - in installations, production and technology. Due to corrupt government policies in Germany, production, tech, and installations went to China.
Thanks for nothing, @CDU, @CSU, @fdp, and parts of @spdde such as @sigmargabriel.


Our garden has been receiving a beautiful and unexpected visitor recently. It is a special pleasure because when we moved in, the garden was devoid of food sources for wildlife.

#wildlife #moths #garden




Code highlighting with Cursor AI for $500,000


Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of attacks currently seems commonplace, with reports of infected packages in repositories like PyPI or npm appearing almost daily. It would seem that increased scrutiny from researchers on these repositories should have long ago minimized the profits for cybercriminals trying to make a fortune from malicious packages. However, our investigation into a recent cyberincident once again confirmed that open-source packages remain an attractive way for attackers to make easy money.

Infected out of nowhere


In June 2025, a blockchain developer from Russia reached out to us after falling victim to a cyberattack. He’d had around $500,000 in crypto assets stolen from him. Surprisingly, the victim’s operating system had been installed only a few days prior. Nothing but essential and popular apps had been downloaded to the machine. The developer was well aware of the cybersecurity risks associated with crypto transactions, so he was vigilant and carefully reviewed his every step while working online. Additionally, he used free online services for malware detection to protect his system, but no commercial antivirus software.

The circumstances of the infection piqued our interest, and we decided to investigate the origins of the incident. After obtaining a disk image of the infected system, we began our analysis.

Syntax highlighting with a catch


As we examined the files on the disk, a file named extension.js caught our attention. We found it at %userprofile%\.cursor\extensions\solidityai.solidity-1.0.9-universal\src\extension.js. Below is a snippet of its content:

A request sent by the extension to the server
A request sent by the extension to the server

This screenshot clearly shows the code requesting and executing a PowerShell script from the web server angelic[.]su: a sure sign of malware.

It turned out that extension.js was a component of the Solidity Language extension for the Cursor AI IDE, which is based on Visual Studio Code and designed for AI-assisted development. The extension is available in the Open VSX registry, used by Cursor AI, and was published about two months ago. At the time this research, the extension had been downloaded 54,000 times. The figure was likely inflated. According to the description, the extension offers numerous features to optimize work with Solidity smart contract code, specifically syntax highlighting:

The extension's description in the Open VSX registry
The extension’s description in the Open VSX registry

We analyzed the code of every version of this extension and confirmed that it was a fake: neither syntax highlighting nor any of the other claimed features were implemented in any version. The extension has nothing to do with smart contracts. All it does is download and execute malicious code from the aforementioned web server. Furthermore, we discovered that the description of the malicious plugin was copied by the attackers from the page of a legitimate extension, which had 61,000 downloads.

How the extension got on the computer


So, we found that the malicious extension had 54,000 downloads, while the legitimate one had 61,000. But how did the attackers manage to lull the developer’s vigilance? Why would he download a malicious extension with fewer downloads than the original?

We found out that while trying to install a Solidity code syntax highlighter, the developer searched the extension registry for solidity. This query returned the following:

Search results for "solidity": the malicious (red) and legitimate (green) extensions
Search results for “solidity”: the malicious (red) and legitimate (green) extensions

In the search results, the malicious extension appeared fourth, while the legitimate one was only in eighth place. Thus, while reviewing the search results, the developer clicked the first extension in the list with a significant number of downloads – which unfortunately proved to be the malicious one.

The ranking algorithm trap


How did the malicious extension appear higher in search results than the legitimate one, especially considering it had fewer downloads? It turns out the Open VSX registry ranks search results by relevance, which considers multiple factors, such as the extension rating, how recently it was published or updated, the total number of downloads, and whether the extension is verified. Consequently, the ranking is determined by a combination of factors: for example, an extension with a low number of downloads can still appear near the top of search results if that metric is offset by its recency. This is exactly what happened with the malicious plugin: the fake extension’s last update date was June 15, 2025, while the legitimate one was last updated on May 30, 2025. Thus, due to the overall mix of factors, the malicious extension’s relevance surpassed that of the original, which allowed the attackers to promote the fake extension in the search results.

The developer, who fell into the ranking algorithm trap, didn’t get the functionality he wanted: the extension didn’t do any syntax highlighting in Solidity. The victim mistook this for a bug, which he decided to investigate later, and continued his work. Meanwhile, the extension quietly installed malware on his computer.

From PowerShell scripts to remote control


As mentioned above, when the malicious plugin was activated, it downloaded a PowerShell script from https://angelic[.]su/files/1.txt.

The PowerShell script contents
The PowerShell script contents

The script checks if the ScreenConnect remote management software is installed on the computer. If not, it downloads a second malicious PowerShell script from: https://angelic[.]su/files/2.txt. This new script then downloads the ScreenConnect installer to the infected computer from https://lmfao[.]su/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest and runs it. From that point on, the attackers can control the infected computer via the newly installed software, which is configured to communicate with the C2 server relay.lmfao[.]su.

Data theft


Further analysis revealed that the attackers used ScreenConnect to upload three VBScripts to the compromised machine:

  • a.vbs
  • b.vbs
  • m.vbs

Each of these downloaded a PowerShell script from the text-sharing service paste.ee. The download URL was obfuscated, as shown in the image below:

The obfuscated URL for downloading the PowerShell script
The obfuscated URL for downloading the PowerShell script

The downloaded PowerShell script then retrieved an image from archive[.]org. A loader known as VMDetector was then extracted from this image. VMDetector attacks were previously observed in phishing campaigns that targeted entities in Latin America. The loader downloaded and ran the final payload from paste.ee.

Our analysis of the VBScripts determined that the following payloads were downloaded to the infected computer:

  • Quasar open-source backdoor (via a.vbs and b.vbs),
  • Stealer that collected data from browsers, email clients, and crypto wallets (via m.vbs). Kaspersky products detect this malware as HEUR:Trojan-PSW.MSIL.PureLogs.gen.

Both implants communicated with the C2 server 144.172.112[.]84, which resolved to relay.lmfao[.]su at the time of our analysis. With these tools, the attackers successfully obtained passphrases for the developer’s wallets and then syphoned off cryptocurrency.

New malicious package


The malicious plugin didn’t last long in the extension store and was taken down on July 2, 2025. By that time, it had already been detected not only by us as we investigated the incident but also by other researchers. However, the attackers continued their campaign: just one day after the removal, they published another malicious package named “solidity”, this time exactly replicating the name of the original legitimate extension. The functionality of the fake remained unchanged: the plugin downloaded a malicious PowerShell script onto the victim’s device. However, the attackers sought to inflate the number of downloads dramatically. The new extension was supposedly downloaded around two million times. The following results appeared up until recently when users searched for solidity within the Cursor AI development environment (the plugin is currently removed thanks to our efforts).

Updated search results for "solidity"
Updated search results for “solidity”

The updated search results showed the legitimate and malicious extensions appearing side-by-side in the search rankings, occupying the seventh and eighth positions respectively. The developer names look identical at first glance, but the legitimate package was uploaded by juanblanco, while the malicious one was uploaded by juanbIanco. The font used by Cursor AI makes the lowercase letter l and uppercase I appear identical.

Therefore, the search results displayed two seemingly identical extensions: the legitimate one with 61,000 downloads and the malicious one with two million downloads. Which one would the user choose to install? Making the right choice becomes a real challenge.

Similar cyberattacks


It’s worth noting that the Solidity extensions we uncovered are not the only malicious packages published by the attackers behind this operation. We used our open-source package monitoring tool to find a malicious npm package called “solsafe”. It uses the URL https://staketree[.]net/1.txt to download ScreenConnect. In this campaign, it’s also configured to use relay.lmfao[.]su for communication with the attackers.

We also discovered that April and May 2025 saw three malicious Visual Studio Code extensions published: solaibot, among-eth, and blankebesxstnion. The infection method used in these threats is strikingly similar to the one we described above. In fact, we found almost identical functionality in their malicious scripts.

Scripts downloaded by the VS Code extension (left) vs. Solidity Language (right)
Scripts downloaded by the VS Code extension (left) vs. Solidity Language (right)

In addition, all of the listed extensions perform the same malicious actions during execution, namely:

  • Download PowerShell scripts named 1.txt and 2.txt.
  • Use a VBScript with an obfuscated URL to download a payload from paste.ee.
  • Download an image with a payload from archive.org.

This leads us to conclude that these infection schemes are currently being widely used to attack blockchain developers. We believe the attackers won’t stop with the Solidity extensions or the solsafe package that we found.

Takeaways


Malicious packages continue to pose a significant threat to the crypto industry. Many projects today rely on open-source tools downloaded from package repositories. Unfortunately, packages from these repositories are often a source of malware infections. Therefore, we recommend extreme caution when downloading any tools. Always verify that the package you’re downloading isn’t a fake. If a package doesn’t work as advertised after you install it, be suspicious and check the downloaded source code.

In many cases, malware installed via fake open-source packages is well-known, and modern cybersecurity solutions can effectively block it. Even experienced developers must not neglect security solutions, as these can help prevent an attack in case a malicious package is installed.

Indicators of compromise


Hashes of malicious JS files
2c471e265409763024cdc33579c84d88d5aaf9aea1911266b875d3b7604a0eeb
404dd413f10ccfeea23bfb00b0e403532fa8651bfb456d84b6a16953355a800a
70309bf3d2aed946bba51fc3eedb2daa3e8044b60151f0b5c1550831fbc6df17
84d4a4c6d7e55e201b20327ca2068992180d9ec08a6827faa4ff3534b96c3d6f
eb5b35057dedb235940b2c41da9e3ae0553969f1c89a16e3f66ba6f6005c6fa8
f4721f32b8d6eb856364327c21ea3c703f1787cfb4c043f87435a8876d903b2c

Network indicators
https://angelic[.]su/files/1.txt
https://angelic[.]su/files/2.txt
https://staketree[.]net/1.txt
https://staketree[.]net/2.txt
https://relay.lmfao[.]su
https://lmfao[.]su/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
144.172.112[.]84


securelist.com/open-source-pac…



Sensitive content

Erik Uden 🍑 reshared this.

in reply to stux⚡

I think the warning for sensitive content needs a few extra steps and ask: "This WILL hurt your eyeballs, are you really really sure you want to see this?"


Riarmo e divieto di Pride, Von der Leyen sull’orlo della sfiducia, Zan: "Dimostri di meritarla".

gay.it/riarmo-e-divieto-di-pri…

> Il PD valuta il ritiro del sostegno alla Commissione tra ambiguità sui diritti e 800 miliardi destinati alle armi.



An Emulated Stroll Down Macintosh Memory Lane


Screenshot of "Frame of Preference"

If you’re into Macs, you’ll always remember your first. Maybe it was the revolutionary classic of 1984 fame, perhaps it was the adorable G3 iMac in 1998, or even a shiny OS X machine in the 21st century. Whichever it is, you’ll find it emulated in [Marcin Wichary]’s essay “Frame of preference: A history of Mac settings, 1984–2004” — an exploration of the control panel and its history.
Image of PowerBook showing the MacOS 8.0 desktop.That’s not a photograph, it’s an emulator. (At least on the page. Here, it’s a screenshot.)
[Marcin] is a UI designer as well as an engineer and tech historian, and his UI chops come out in full force, commenting and critiquing Curputino’s coercions. The writing is excellent, as you’d expect from the man who wrote the book on keyboards, and it provides a fascinating look at the world of retrocomputing through the eyes of a designer. That design-focused outlook is very apropos for Apple in particular. (And NeXT, of course, because you can’t tell the story of Apple without it.)

There are ten emulators on the page, provided by [Mihai Parparita] of Infinite Mac. It’s like a virtual museum with a particularly knowledgeable tour guide — and it’s a blast, getting to feel hands-on, the design changes being discussed. There’s a certain amount of gamification, with each system having suggested tasks and a completion score when you finish reading. There are even Easter eggs.

This is everything we wish the modern web was like: the passionate deep-dives of personal sites on the Old Web, but enhanced and enabled by modern technology. If you’re missing those vintage Mac days and don’t want to explore them in browser, you can 3D print your own full-size replica, or a doll-sized picoMac.


hackaday.com/2025/07/10/an-emu…



"Onhan tämä rankka tehtävä, mutta ei ne kupit itse itseään nuole puhtaaksi 🤷"

#koirat #dogs #DogsOfMastodon #Australian#Kelpie #kelpies



Und jetzt stellen wir uns mal vor das wäre eine Straße für Autos und kein Bürgersteig - was dann an Geschrei los wäre...
in reply to 🐴 Sharp Stallion 🏳️‍🌈

Das Bild zeigt eine Straße unter einem Betonbrückenabschnitt. Auf der rechten Seite steht ein Schild mit der Aufschrift "Hagenauer Str." und einem grünen Kreuz, das für einen Rettungspunkt steht. Darunter ist die Anweisung "Ruf 112 wählen" zu lesen. Neben dem Schild befindet sich ein rotes und weißes Warnschild mit einem orangefarbenen Licht. Die Straße führt in die Ferne, wo weitere Fahrzeuge und ein weiterer Brückenabschnitt zu sehen sind. Der Himmel ist blau und wolkenlos.

Das Bild zeigt eine ruhige Straße an einem sonnigen Tag. Im Vordergrund ist ein Gehweg zu sehen, der von einer dichten Grünhecke gesäumt wird. Die Straße ist asphaltiert und hat eine zentrale Fahrbahnlinie. Mehrere Autos fahren in beide Richtungen, und im Hintergrund sind einige Gebäude und Bäume zu erkennen. Links im Bild sind mehrere Fahnen mit der Aufschrift "Billux" angebracht, was auf ein Geschäft oder eine Werbung hinweisen könnte. Die Straßenlaternen sind gleichmäßig entlang der Straße aufgestellt. Der Himmel ist klar und blau, was auf gutes Wetter hinweist.

Bereitgestellt von @altbot, privat und lokal generiert mit Ovis2-8B

🌱 Energieverbrauch: 0.684 Wh



Password manager KeePass 2.59 introduces native ARM64 support on Windows 11, faster AES encryption, a new C# KDB import/export module, enhanced browser integration, improved security and performance, and much more.
alternativeto.net/news/2025/7/…
in reply to AlternativeTo

The image features a simple, stylized icon of a padlock centered within a circular border. The padlock is depicted in black, with a classic design that includes a shackle and a body with horizontal lines, symbolizing security and protection. The circular border around the padlock is white with a subtle gradient, transitioning from white at the center to a light blue at the edges. The background of the image is a solid, deep blue color, providing a strong contrast that makes the padlock icon stand out prominently. The overall design is minimalistic and modern, conveying a sense of security and privacy.

Provided by @altbot, generated privately and locally using Ovis2-8B

🌱 Energy used: 0.131 Wh



Life next to a US data center

"I can't live in my home with half of my home functioning and no water," Ms Morris says. "I can't drink the water."

"I'm afraid to drink the water, but I still cook with it, and brush my teeth with it," says Morris. "Am I worried about it? Yes."

Meta, however, says its data center and the poor water quality are not connect.

Meta, the truth sayer.

bbc.com/news/articles/cy8gy7lv…

in reply to Amiga Unicorn

Well, according to the article (which I don't trust entirely, as news outlets regularly get the most basic technical aspects wrong):

Many centres use evaporative cooling systems, where water absorbs heat and evaporates - similar to how sweat wicks away heat from our bodies. On hot days, a single facility can use millions of gallons.


Then, technically, water is not "missing", just turned into steam, but... you get me.

The Beeb is sort of implying this is the case, but of course they didn't bother to dig up or offer any more specifics to the reader.

in reply to Some Dude on the Interwebs

and?

Evaporating it means that it will rain somewhere else. No water is lost. There are no chemical transformations, so evaporative systems, even if the output was steam, are just creating clouds of water, which will rain again.

Where is the "lost" water, exactly?

in reply to Amiga Unicorn

@amigaunicorn
Land is losing freshwater
abc.net.au/news/science/2025-0…

As the atmosphere heats up, it holds more water longer

Many drought stricken areas lose freshwater because of evaporative cooling.

Evaporative cooling often uses chemicals and leaves behind a nasty sludge.

There's another water part of a data center which actually circulates water around the servers. This uses highly chemically treated water which is changed regularly because of various buildups

@somedude @rustoleumlove

in reply to Amiga Unicorn

I suppose it's "lost" in the sense that it's no longer available where it previously was.

If I evaporate your pool, no water is "lost", but you'll have a hard time bathing in it.

I think that's what they're trying to say, but it's... pretty vague, to say the least.

in reply to Some Dude on the Interwebs

wait, wait wait. We are talking about ecology, meaning the ecosystem. Global view is the only view. A pool is not ecology. Is like confusing weather with climate.
in reply to Amiga Unicorn

@amigaunicorn
To someone who is thirsty, it matters a lot that there isn't enough water nearby.

And anyway, there is a global freshwater crisis that is accelerating.

So, both locally and global, there are huge and growing issues with access to freshwater.

@somedude @rustoleumlove



"Our exact #GDP is not just unknown, but unknowable, so the false precision with which it is discussed is deeply misleading."

(2) #Welfare and the unexpected tyranny of government #statistics
martinrobbins.substack.com/p/w…

#UKpol
#UKeconomy
#Journalism
#media
#statisticalinterpretation
#EconomicForecast
#ONS
#governmentspending