Salta al contenuto principale



Ukrainian Colonel Anatoliy Shtefan "Shtirlitz" reports that a missile strike on August 26 eliminated eight officers of Russiaโ€™s FSB Border Service.


This weekend I will be at #Connichi !๐Ÿ’–

Find me at T17 in the Artist Alley.
I will have new merch, including my brand new carabiners and the summer prints with me! ๐Ÿคฉ

#artistalley #connichi2025 #pixelartist



AI web crawlers are destroying websites in their never-ending hunger for any and all content

theregister.com/2025/08/29/ai_โ€ฆ

Yes, of course, we can try to fend them off with logins, paywalls, CAPTCHA challenges, and sophisticated anti-bot technologies. You know one thing AI is good at? It's getting around those walls.

As for robots.txt files, the old-school way of blocking crawlers? Many โ€“ most? โ€“ AI crawlers simply ignore them.

in reply to Khrys

Would it be possible to troll these things using a TOS page stating: "Access to the content of this site requires a USD 1M, unless you are a human. Click here (or whatever suitable challenge) to confirm you accept these TOS". And then send a bill to the crawlers.



๐Ÿ†• blog! โ€œA little oddity in the way curl deals with old datesโ€

For boring technical reasons, computers think the world began on 1st of January 1970. To keep track of the future, they count the number of seconds since that momentous date. So zero seconds represents midnight on that day.

So how do computers deal with dates before The Beatles' Abbey Road was โ€ฆ

๐Ÿ‘€ Read more: shkspr.mobi/blog/2025/09/a-litโ€ฆ
โธป
#bug #curl #linux #time

Terence Eden reshared this.



At the risk of starting discourse, let me be clear about what I personally mean when I say that ATproto is centralized:

โ€ข If the bsky.app domain goes down or is blocked, approximately 99.9% of the ATproto network goes down.
โ€ข I personally have no way of using ATproto that doesn't depend on self-hosting or relying on bsky.app. (This one might not hold if I had an invite link.)
โ€ข ATproto is not under open governance. Bsky PBLLC has promised to donate it to IETF, but that has not happened IIUC.

in reply to Kuba Suder โ€ข @mackuba.eu on ๐Ÿฆ‹

@mackuba Perhaps a more precise question, then, would be what happens if the Bluesky PDS and AppView both go down? That's not a contrived scenario, to be sure โ€” that Bluesky-the-company was able to block access to the bulk of the ATproto network from Mississippi (a decision I take no issue with, to be sure!) shows that if compelled to, Bluesky-the-company has a significant ability to take down infrastructure.
in reply to Cassandra Granade ๐Ÿณ๏ธโ€โšง๏ธ

The Mississippi block is a bit different, because they've done it only on the client level, so using a different client works around that.

But yeah, if all their PDSes and their AppView disappeared, then we'd basically be left with the self-hosters scrambling to put up something AppView-shaped to at least talk between each other and then build up from there.



Suerte Animalitera
#1Sept #LosEscondidos
LottoActivo LaGranjita
SelvaPlus

- (01) CARNERO ๐Ÿ
- (10) TIGRE ๐Ÿ…
- (25) GALLINA ๐Ÿ”
- (33) PESCADO ๐Ÿ 

ร‘apa - (0) DELFรN ๐Ÿฌ

#Telegram #Instagram
#Signal #Bluesky
#Mastodon
#LosTosTonesyRefrescos_
#RT ๐Ÿ€๐Ÿคž



La Suerte Animalitera
โžก๏ธ #1Sept
Loterias
Zulia - Chance
Caracas-Tachira
ยก Juegalo como Quieras !
๐Ÿ‘‡
โžก๏ธ 333 - 000

#Telegram #Signal
#Bluesky #Mastodon
#Facebook #LosTosTonesyRs_
#LosTosTonesyRefrescos_
ยกMuchichisisisisimas Fรฉ y Suerte!
ยกY vamos por MAAASS!
โžก๏ธ #RT ๐Ÿ€๐Ÿคž



โ€œNo fault evictionsโ€ soar under UK Labour government stuffed with landlords - World Socialist Web Site

wsws.org/en/articles/2025/08/3โ€ฆ

Quincy reshared this.



Dla serwisรณw spoล‚ecznoล›ciowych jesteล›my tym cenniejsi, im ล‚atwiej puszczajฤ… nam nerwy #Wyborcza #Trump #Musk #X

Sprawdzili 160 tys. wpisรณw na ...






Tommy Cash lancia il videoclip di 'Ok', girato in Italia
https://tg24.sky.it/spettacolo/musica/2025/09/01/tommy-cash-ok-video?utm_source=flipboard&utm_medium=activitypub

Pubblicato su Spettacolo @spettacolo-SkyTG24




Lโ€™intelligenza artificiale a servizio della genetica. Arriva lโ€™AI per decifrare il Dna

[quote]ROMA โ€“ Lโ€™intelligenza artificiale a servizio della genetica รจ giร  realtร  e prova ora a raggiungere nuovi traguardi. A farlo รจ lโ€™azienda statunitense Deepmind che giร  nel 2020 aveva sfruttatoโ€ฆ
L'articolo Lโ€™intelligenza artificiale a servizio della genetica. Arriva


in reply to Andi Waffeln!

Entschuldigung, ich konnte dieses Bild nicht verarbeiten.
โ€•
Entschuldigung, ich konnte dieses Bild nicht verarbeiten.
โ€•
Entschuldigung, ich konnte dieses Bild nicht verarbeiten.
โ€•
Entschuldigung, ich konnte dieses Bild nicht verarbeiten.


โ€œ๐Ÿคฏ#Switch2ใฎUSB-C_ไปปๅคฉๅ ‚ใŒใพใ•ใ‹ใฎใ€Œ็ฝ ใ€๏ผ๏ผŸๆทฑใพใ‚‹ไบ’ๆ›ๆ€งใฎ้—‡ใ‚’ๆšดใ๏ผ#Switch2 #USBC #ไปปๅคฉๅ ‚ใฎ้‡Žๆœ› #ไน01โ€ (1 user) htn.to/2ckjSVm55p #ๆƒ…ๅ ฑๅ‡ฆ็† #USBC #ไปปๅคฉๅ ‚ #ๆŠ€่ก“ #ๆถˆ่ฒป่€… #game #ๆ—ฅๆœฌ #ใƒ“ใ‚ธใƒใ‚น #ใ‚ปใ‚ญใƒฅใƒชใƒ†ใ‚ฃ #tech

ยท
โ€œ50ๅนด็›ฎใฎใƒžใ‚คใƒ‰ใƒŠใƒผ่จˆ็”ปโ€”โ€”ๆ‰€ๆœ‰ใฎๆฐ‘ไธปๅŒ–ใ‹ใ€ๅคฑๆ•—ใฎๆ•™่จ“ใ‹๏ผŸ #็ตŒๆธˆๆฐ‘ไธปไธป็พฉ #ๆœชๆฅใฎใƒ‡ใ‚ถใ‚คใƒณ #ไน01 1914ใƒซใƒ‰ใƒซใƒ•ใƒปใƒžใ‚คใƒ‰ใƒŠใƒผใฎใƒžใ‚คใƒ‰ใƒŠใƒผ่จˆ็”ป_ๆ˜ญๅ’Œใ‚นใ‚ฆใ‚งใƒผใƒ‡ใƒณๅฒใ–ใฃใใ‚Š่งฃ่ชฌโ€ (1 user) htn.to/2Rh9UnydeH #ๅŒ—ๆฌง #ใ‚นใ‚ฆใ‚งใƒผใƒ‡ใƒณ #็ตŒๆธˆ #ๅŠดๅƒ #็ตŒๆธˆๅฒ




Pernille for 3 uger siden:
โ€œAj mand, nu skal jeg holde fast i den fantastisk afslappethed vi har opnรฅet i ferien og ikke starte for mange projekter op. Det mรฅ vi hjรฆlpe hinanden medโ€.

Mand for 3 uger siden:
โ€œUhm det siger du nu, menโ€ฆโ€

Pernille nu: โ€œAj hvor fedt, jeg skal da have kolleger til havevandring, starte ny vane med sรธndagsmorgenbadning med nabo, lรฆre at sy en sรฆrk (og kjolen som passer til sgu), plante de frugttrรฆer jeg mangler, tage stiklinger af alt, aldrig sige nej til fede nye brainstorming ideer pรฅ arbejdeโ€ .
๐Ÿคฏ hvornรฅr har vi ferie igen?

Unknown parent

mastodon - Collegamento all'originale
alf149 (Rolf Amfelt)
@infonauten @holsta @Ruth_Mottram
Det har du ikke rรฅd til, primรฆrt pga. prisen pรฅ at sende chokoladen.
Gรธr ogsรฅ svartiden pรฅ apiโ€™et lidt langsomt.
Unknown parent

mastodon - Collegamento all'originale
Ulf Reese Nรฆsborg
@holsta @Ruth_Mottram @alf149 hvad bliver prisen for API-adgang pรฅ Enterprise-niveau?


Flashback 22 years ago, remembering my buddy Zeke and the carโ€™s dog nose radio. As we drove into work heโ€™d be sniffing an air vent, checking the "newsโ€. If something interesting came over the airwaves heโ€™d excitedly verify it in a second vent to the side, stereo if you will.
#DogsOfMastodon #MonDog
Questa voce รจ stata modificata (2 settimane fa)

reshared this



ยกHoy es el Dรญa de Apreciaciรณn de los Rotulistas! Esta gente se lo curra para que los cรณmics *se oigan*, dadles cariรฑo #lettererappreciationday


Today is house meeting day for us at DMI as we find out where the state's budget cuts will land and who will be affected (i.e. made redundant).

Coincidentally, one of our #Ukraine #AntarcticScience centre colleagues has just sent us a draft deliverable report to review.

They apologise for lack of polish (it's actually really good! And very interesting science looking at climate change impacts in Antarctica) and they appended this photo of their apartment block after a visit by a Russian drone last week.

And suddenly, Danish state budget cuts seem much less worse...

And now I am going to find someone to swear at.

Eye reshared this.



Chinaโ€“Tรผrkiye Leaders Pledge Deeper Ties at SCO Summit thedailycpec.com/china-turkiyeโ€ฆ


New post! Cโ€™era poi una terza corrente che faceva riferimento al pensatore Julius Evola Read more here collasgarba.wordpress.com/2025โ€ฆ
Cโ€™era poi una terza corrente che faceva riferimento al pensatore Julius Evola Non รจ possibile utilizzare la categoria di destra nellโ€™Italia del secondo dopoguerra senza fare i conti con ยซโ€œlโ€™invasioneโ€ del concetto di destra da parte del fascismoยป <1. รˆ quella che รจ stata


Cโ€™era poi una terza corrente che faceva riferimento al pensatore Julius Evola


Non รจ possibile utilizzare la categoria di destra nellโ€™Italia del secondo dopoguerra senza fare i conti con ยซโ€œlโ€™invasioneโ€ del concetto di destra da parte del fascismoยป <1. รˆ quella che รจ stata piรน volte rilevata come lโ€™anomalia della destra italiana: antiliberale, antisistema e antimoderna, tanto che essa stessa รจ arrivata a rifiutare lโ€™etichetta di destra, che dallโ€™evento fondativo della modernitร  โ€“ la rivoluzione francese โ€“ aveva tratto origine <2. Lโ€™accostamento di destra e (neo) fascismo ha avuto lโ€™effetto di rimuovere la destra dal circuito della legittimitร  politica. Una riprova in questo senso รจ la mancata separazione di destra ed estrema destra โค. Condannati nel ghetto dellโ€™illegittimitร , missini e monarchici stentavano a sopravvivere agli albori dellโ€™Italia repubblicana e antifascista. La condanna, perรฒ, lungi dallโ€™essere meramente imposta dal sistema, era paradossalmente cercata. Il rapporto tra identitร  e legittimitร  costituisce unโ€™utile cartina di tornasole per comprendere le ragioni degli esclusi. รˆ stata la stessa identitร  a generare illegittimitร , che a sua volta li ha relegati ai margini della competizione politica. Tale marginalitร  ha rilanciato lโ€™orgoglio della diversitร  e ha alimentato la spirale dellโ€™identitร  illegittima <4.
Nel 1948 le urne non avevano dato grandi soddisfazioni ai partiti di destra, se si esclude lโ€™effimero successo dellโ€™Uomo Qualunque <5. Tuttavia, alla trascurabile rappresentanza parlamentare non corrispondeva la medesima diffusione nella societร . Solo in parte, infatti, la presenza della destra in parlamento rendeva ragione dellโ€™ampiezza della destra nella societร  e nel mondo imprenditoriale e culturale in senso lato.
Alla luce di queste considerazioni, la riduzione della categoria di destra a neofascismo non รจ esaustiva. Sia perchรฉ il neofascismo aveva ancoraggi culturali e ideologici anche a sinistra e sia, soprattutto, perchรฉ non permette di capire lโ€™Italia degli anni Cinquanta, periodo privilegiato per indagare la consistenza e il seguito della destra โ€“ sia in Parlamento che nella societร  โ€“ nel nostro Paese.
รˆ necessario, a questo proposito, non cedere alla tentazione di identificare la destra con il fascismo nรฉ con il neofascismo. E allargare lโ€™orizzonte a quella che รจ stata felicemente definita destra โ€œimpoliticaโ€ o โ€œcarsicaโ€. Una destra, cioรจ, che non solo non si identificava coi due terminali partitici allโ€™estremitร  dello schieramento politico โ€“ Pnm e Msi โ€“ ma era anzi assai critica nei loro confronti. Distanziandosi dalla โ€œiper-politicitร โ€ delle due formazioni, presentava non di rado spiccate venature di antipolitica e di scetticismo nei confronti del sistema parlamentare in quanto tale. Ciรฒ premesso, il riferimento al fascismo di questa seconda declinazione della destra si presentava piuttosto sfumato. La nostalgia dei โ€œbei tempi andatiโ€, siano essi identificati col Duce o con la Corona, rimaneva nellโ€™alveo di un generico conservatorismo, piuttosto distante da Salรฒ e da contenuti programmatici aggressivi. Era un fronte sociale eterogeneo ยซsempre pronto a palpitare per generiche cause nobili ma restio a mobilitarsi davvero nellโ€™agone politicoยป <6. Alla critica per certi versi acuta e formidabile nei confronti del sistema politico non seguiva mai un programma organico e credibile. Tanto era profonda la distanza dai missini, quanto era generica lโ€™attesa delle โ€œforze saneโ€ che avrebbero dovuto soppiantare il tanto vituperato โ€œciellenismoโ€. Si trattava di unโ€™attesa che univa industriali di vari settori a intellettuali come Indro Montanelli. Accomunati dal rifiuto del nascente sistema partitocratrico, avevano individuato distorsioni che si sarebbero approfondite nel tempo. Con ogni probabilitร , le piรน preoccupanti erano lโ€™eccessivo potere dei partiti e lo sconvolgimento di credenze consolidate. Ma erano uniti piรน contro qualcosa che per un progetto comune, eccezion fatta per lโ€™esperienza di Edgardo Sogno. In altri termini, il collante delle varie famiglie e personalitร  della destra nellโ€™Italia degli anni Cinquanta era lโ€™avversione al comunismo <7. Oltre a dover sopportare, a volte giustamente e altre meno, il fardello del fascismo, lโ€™altro dato strutturale delle destre era, appunto, lโ€™anticomunismo.
รˆ utile passare in rassegna piรน nel dettaglio le destre in Italia allโ€™indomani del conflitto mondiale, tenendo ben presente anche il contesto internazionale. Fin dalla fondazione, nel dicembre โ€™46, vari furono i problemi che dovette affrontare il Movimento sociale italiano. Il partito riunรฌ numerosi gruppi e associazioni che erano sorti spontaneamente dopo la guerra. Giร  durante il conflitto, stando allโ€™attento lavoro di Parlato, si erano poste le basi, con la collaborazione dellโ€™Oss (Office of strategic services) e di alcuni settori del Vaticano <8, per la nascita di un soggetto politico del genere. Dopo la guerra, e in particolare in occasione del referendum del โ€™46, anche Pci e Dc, con interessi e finalitร  diverse, si impegnarono a trattare col neofascismo <9. Inoltre, i missini cavalcarono le proteste sorte in seguito alle condizioni di pace e si presentarono come gli unici veri interpreti della nazione italiana <10.
Risolto il problema della sopravvivenza, anche grazie allโ€™amnistia <11, lโ€™altra battaglia era quella della scelta legalitaria rispetto alla clandestinitร . Tale scelta, tuttโ€™altro che unanime, suscitรฒ i malumori dei giovani e dei reduci che avevano attivamente partecipato alla Rsi. Era, in termini piรน generali, la spia della presenza di due anime: una di โ€œsinistraโ€, repubblicana, antioccidentale e terzaforzista che intendeva combattere il regime ciellenista traditore dello spirito di Salรฒ, e lโ€™altra, piรน pragmatica, nazional-conservatrice in campo sociale e religioso, filomonarchica e filoatlantica, che voleva inserirsi nel sistema politico parlamentare <12. Principali interpreti della tendenza legalitaria erano Romualdi e Michelini. Per estendere lโ€™area di influenza del partito e far fronte alla sfida comunista, puntavano a trasformare il neofascismo ยซda fenomeno di conventicole perdenti in forza politica in grado di parlare a molti, se non a tuttiยป <13. Tuttavia, la strategia del โ€œSenatoโ€ missino era destinata a rimanere sulla carta e ad essere soppiantata dallโ€™attivismo di Almirante. Da gennaio โ€™47 alla vigilia delle elezioni politiche del โ€™48, la struttura del Msi venne modificata sia a causa di una serie di eventi โ€“ arresti, uccisioni e allontanamenti โ€“ che misero fuori gioco esponenti del โ€œpartito di Romualdiโ€, sia per la strategia almirantiana. Lโ€™approccio di Almirante comportava un radicamento sul territorio prima sconosciuto. Dai comizi nelle piazze al โ€œgiornale parlatoโ€, il Msi acquisiva un metodo e una visibilitร  completamente nuovi <14.
Alla decisiva scadenza elettorale del 18 aprile 1948 il partito si presentava con un programma comprendente la critica serrata alla Costituzione, il rilancio di alcuni nodi irrisolti della politica estera, la socializzazione del lavoro e la valorizzazione della necessaria opposizione nazionale al governo e ai socialcomunisti <15. Il Msi, sulla base di un programma decisamente โ€œsocialeโ€, raccolse perรฒ voti soprattutto tra i notabili e i grandi proprietari terrieri del Sud. Eleggendo sei deputati e un senatore, tutti nelle circoscrizioni meridionali, il partito della Fiamma concludeva la fase della clandestinitร  ma non poteva evitare di fare i conti con lโ€™inattesa geografia dei consensi e con la difformitร  tra elettori potenziali ed effettivi. Si trattava della forbice tra dirigenti e militanti da una parte ed elettori dallโ€™altra. Una forbice la cui presenza era fisiologica in ogni partito, ma che nel Msi assurgeva a vero e proprio carattere distintivo a causa della grande distanza โ€“ nello stesso tempo geografica, storica e ideale โ€“ tra attivisti ed elettori. Tale aspetto, ampiamente rilevato dalla storiografia, ha obbligato i dirigenti a retrocedere dalle ยซoriginarie velleitร  barricadiere e ribellisticheยป <16, pena la scomparsa del partito stesso. Come ha efficacemente sottolineato Tarchi, ยซper il Mezzogiorno il fascismo aveva rappresentato un fenomeno di promozione e di accelerazione della mobilitร  sociale verso lโ€™alto, che non aveva avuto riscontro nella parte piรน sviluppata del Paeseยป <17.
Non era certo sufficiente la rappresentanza parlamentare a garantire il crisma della legittimitร . Da parte sua, il Msi continuava ad agire in maniera quasi schizofrenica: da un lato riaffermava la propria identitร  di partito di nicchia, dallโ€™altro si poneva come partito-nazione e ยซaccreditandosi come titolare di una investitura quasi sacraleยป <18 si contrapponeva agli altri partiti. In cima allโ€™agenda politica dei missini cโ€™erano battaglie <19. Dal punto di vista interno costituivano una prioritร  la collocazione del partito nello spazio politico e la conseguente strategia di alleanze, la battaglia contro lโ€™epurazione, i diritti dei combattenti della Rsi e la politica sociale. Da quello internazionale lโ€™adesione al Patto Atlantico, il ruolo dellโ€™Italia come potenza coloniale e la questione di Trieste erano gli argomenti principali.
Questi temi furono oggetto di discussione al secondo congresso, che ebbe luogo a Roma nel 1949 e vide consolidarsi la presenza delle due anime antitetiche su pressochรฉ tutte le questioni sollevate. Cโ€™era poi una terza corrente, piรน culturale e meno politica, che faceva riferimento al pensatore Julius Evola, tradizionalista, antililiberale, antimoderno, anticristiano e fautore di un โ€œrazzismo spiritualeโ€. <20 Tale confronto, con diverse sfumature, incontri e scontri piรน o meno decisivi, ha scandito tutte le fasi della storia del Movimento sociale italiano. <21

[NOTE]1 G. Parlato, La cultura internazionale della destra tra isolamento e atlantismo (1946-1954), in G. Petracchi (a cura di), Uomini e nazioni. Cultura e politica estera nellโ€™Italia del Novecento, Gaspari editore, Udine, 2005, p. 134. Si vedano anche: E. Galli della Loggia, Intervista sulla destra, Laterza, Roma-Bari, 1994, pp. 134-135; R. Chiarini, La destra italiana. Il paradosso di una identitร  illegittima, ยซItalia contemporaneaยป, n. 185, dicembre 1991, p. 585.
2 M. Revelli, La destra nazionale. Un manuale per capire, un saggio per riflettere, Il Saggiatore, Milano, 1996, p. 63.
3 A titolo di esempio, Ginsborg ha scritto che ยซle perdite democristiane del 1953 erano andate a vantaggio dellโ€™estrema destraยป, P. Ginsborg, Storia dโ€™Italia dal dopoguerra a oggi, Einaudi, Torino, 2006, p. 192. Tra gli altri autori che associano la destra allโ€™estremismo si segnalano F. Ferraresi (a cura di), La destra radicale, Feltrinelli, Milano, 1984, p. 13 e P. Di Loreto, La difficile transizione. Dalla fine del centrismo al centrosinistra 1953-1960, Il Mulino, Bologna, 1993, p. 55 n. Anche Bobbio ha espresso le sue perplessitร  su una distinzione semantica che non รจ secondaria. Distinguendo ยซuna destra eversiva da una destra moderata, cui dallโ€™altra parte corrisponderebbero una sinistra moderata e una eversiva, si otterrebbe il duplice vantaggio di non forzare il linguaggio e di non usare un criterio di distinzione sbilanciatoยป, N. Bobbio, Destra e sinistra. Ragioni e significati di una distinzione politica, Donzelli, Roma, 1994, p. 63.
4 R. Chiarini, Destra italiana. Dallโ€™Unitร  dโ€™Italia a Alleanza Nazionale, Marsilio, Venezia, 1995, p. 12.
5 Sullโ€™Uomo Qualunque si vedano: S. Setta, Lโ€™Uomo Qualunque 1944-1948, Laterza, Roma-Bari, 1975; S. Setta, La Destra nellโ€™Italia del dopoguerra, Laterza, Roma-Bari, 1995, pp. 13-18; G. Parlato, La nazione qualunque. Riformismo amministrativo ed europeismo in Guglielmo Giannini, ยซStoria contemporaneaยป, a. XXV, n. 6, dicembre 1994.
6 R. Chiarini, Destra italiana, cit., pp. 64-65 e 76-77.
7 Si veda soprattutto D. Cofrancesco, Destra e sinistra. Per un uso critico di due termini chiave, Bertani, Verona, 1984, p. 47.
8 G. Parlato, Fascisti senza Mussolini. Le origini del neofascismo in Italia, 1943-1948, Il Mulino, Bologna, 2006. Il ruolo della Chiesa cattolica non va perรฒ esagerato. Parlato ritiene infatti (p. 304) ยซsbrigativa โ€“ e, soprattutto, indimostrata โ€“ lโ€™affermazione di Murgia secondo la quale โ€œil Movimento Sociale Italiano nasce con la benedizione del Vaticanoโ€ยป, si veda P.G. Murgia, Il vento del Nord, Storia e cronaca del fascismo dopo la Resistenza (1945-1950), Sugarco, Milano, 1975, p. 295.
9 Si vedano P. Buchignani, Fascisti rossi. Da Salรฒ al Pci, la storia sconosciuta di una migrazione politica 1943-1953, Mondadori, Milano, 2007; P. Ignazi, Il polo escluso. Profilo del Movimento Sociale Italiano, Il Mulino, Bologna, 1989,
p. 24.
10 Utile in proposito la riflessione di Neglie: ยซLa Nazione diventรฒ cosรฌ il terreno eletto per giocare la partita della propria sopravvivenza politica, in un paese ancora preda di fremiti rivoluzionari, di desideri di vendetta, bisognoso di chiarezza e unitร  di intentiยป, P. Neglie, Il Movimento Sociale Italiano tra terzaforzismo e atlantismo, ยซStoria contemporaneaยป, a. XXV, n. 6, dicembre 1994, p. 1170. Si vedano anche M. Revelli, La destra nazionale, cit., pp. 70-71; P. Rosenbaum, Il nuovo fascismo. Da Salรฒ ad Almirante. Storia del Msi, Feltrinelli, Milano, 1975, p. 39.
11 Si veda M. Franzinelli, Lโ€™amnistia Togliatti. 22 giugno 1946. Colpo di spugna sui crimini fascisti, Mondadori, Milano, 2006.
12 Si vedano S. Finotti, Difesa occidentale e Patto Atlantico: la scelta internazionale del Msi (1948-1952), ยซStoria delle relazioni internazionaliยป, a. VI, n. 1, 1988, p. 88; M. Tarchi, Cinquantโ€™anni di nostalgia. La destra italiana dopo il fascismo, Intervista di A. Carioti, Rizzoli, Milano, 1995, p. 32; P.G. Murgia, Ritorneremo! Storia e cronaca del fascismo dopo la Resistenza (1950-1953), Sugarco, Milano, 1976, p. 98. Per una dettagliata analisi dei vari movimenti, tra cui i Far, e personaggi che rifiutarono lโ€™opzione moderata si veda G. Parlato, Fascisti senza Mussolini, cit., pp. 255-269.
13 G. Parlato, Fascisti senza Mussolini, cit., p. 250.
14 Sulla nuova strategia missina si veda G. Parlato, Fascisti senza Mussolini, cit., pp. 269-280; P.G. Murgia, Ritorneremo!, cit., p. 88-92.
15 Sul programma del โ€™48 si vedano M. Revelli, La destra nazionale, cit., p. 23; G. Roberti, Lโ€™opposizione di destra in Italia 1946-1979, Gallina, Napoli, 1988, p. 40. Ignazi lo ha definito un ยซprogramma orientato a sinistraยป, P. Ignazi, Il polo escluso, cit., p. 46.
16 M. Tarchi, Cinquantโ€™anni di nostalgia, cit., p. 32. Si veda anche P. Neglie, Il Movimento Sociale Italiano tra terzaforzismo e atlantismo, cit., p. 1174.
17 M. Tarchi, ibidem, p. 33.
18 R. Chiarini, ยซSacro egoismoยป e ยซmissione civilizzatriceยป. La politica estera del Msi dalla fondazione alla metร  degli anni Cinquanta, ยซStoria contemporaneaยป, a. XXI, n. 3, giugno 1990, p. 457.
19 Per unโ€™analisi delle sfide che deve fronteggiare il Msi dal 1949 si veda P. Ignazi, Il polo escluso, cit., pp. 54-59; M. Tarchi, Cinquantโ€™anni di nostalgia, cit., pp. 48-50; P. Rosenbaum, Il nuovo fascismo, cit., p. 197. Sulla situazione dei giovani missini si veda A. Carioti, Gli orfani di Salรฒ. Il โ€œsessantotto neroโ€ dei giovani neofascisti nel dopoguerra 1945-1951, Mursia, Milano, 2008, cap. 4, pp. 118-150.
20 M. Revelli, La destra nazionale, cit., p. 20. Si veda anche D. Lembo, Fascisti dopo la liberazione. Storia del fascismo e dei fascisti nel dopoguerra, dalla Repubblica Sociale al Movimento Sociale Italiano 1945-1956, MA.RO. Editrice,
Copiano (Pv), 2007, pp. 113-116, e A. Jellamo, J. Evola, il pensatore della tradizione, in F. Ferraresi, (a cura di), La destra radicale, cit., pp. 215-252.
21 Si veda P. Ignazi, Il polo escluso, cit., p. 59.
Federico Robbe, Gli Stati Uniti e la Destra italiana negli anni Cinquanta, Tesi di dottorato, Universitร  degli Studi di Milano, Anno accademico 2009-2010

#1947 #1948 #1949 #amnistia #anticomunismo #antipolitica #Congresso #destra #elezioni #FedericoRobbe #GiorgioAlmirante #JuliusEvola #legalitaria #Meridione #MSI #neofascismo #OSS #Sociale #StatiUniti #tendenza #Vaticano





It would be nice to wake up and not feel like I rolled down a hill several times the day before.

in reply to Davriellelouna

Good for them:

I wish the Tunisian people well: they've had better-quality democracy, enough to taste their real rights, & hope they take all the wisdoms/insights of Ghandi, & Nelson Mandela, & systematically force the earning of their civil-rights..

_ /\ _



GLOBAL SUMUD FLOTILLA: PARTITE LE PRIME BARCHE. ALTRE SE NE AGGIUNGERANNO GIOVEDรŒ DA CATANIA radiondadurto.org/2025/09/01/gโ€ฆ #solidarietร internazionale #globalsumudflotilla #INTERNAZIONALI #strisciadigaza #barcellona #Palestina #genova #News #gaza

reshared this





Letโ€™s talk about period tracking, health data & privacy. Some apps misuse your dataโ€”learn how to protect yourself.

๐Ÿ”— Read more: datadetoxkit.org/en/health/cycles-of-influence
๐Ÿ”— Choose a safer app: datadetoxkit.org/en/health/none-of-their-business



Watching season 1 of The White Lotus. Greg is a stone cold legend.

"Come here, crazy. You're not really cuckoo."

#TV #comedy #drama #TheWhiteLotus



Donnarumma al City, Juventus con Openda. Rabiot-Milan: ore calde prima del gong

[quote]MILANO โ€“ A poche ore dal gong finale che chiuderร  la sessione estiva di calciomercato, previsto alle 20:00, le squadre della serie A sono alla ricerca degli ultimi tasselli perโ€ฆ
L'articolo Donnarumma al City, Juventus con Openda. Rabiot-Milan: ore calde prima del gong su



ฮงฮนฮปฮนฮฌฮดฮตฯ‚ ฯƒฯ„ฮนฯ‚ ฯƒฯ…ฮฝฮฑฯ…ฮปฮฏฮตฯ‚. 10 ฮฌฯ„ฮฟฮผฮฑ ฯƒฯ„ฮฟ ฯ€ฮตฮดฮฏฮฟ ฮฑฮฝฮฌฮณฮบฮทฯ‚.
๐Ÿ™



I've been working with content and data since the mid-1990s. Most techies see data as bit and bytes. All of it is good. Even if it's badly written, out of data, plain wrong--or whatever. The more data, the better. Don't delete the data because you never know. We can never have enough data.

From this culture comes the crappy AI that we know. Feed it enough data and because of the sheer quantity, intelligence will flow. It's Cult of Volume. A high art of stupidity. Smartest guys in the room?



Australiaโ€™s government trial of ageโ€‘assurance tech to keep underโ€‘16s off social media says social media age checks can be done, despite errors and privacy risks


cross-posted from: programming.dev/post/36686657

Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia โ€“ our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the projectโ€™s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trialโ€™s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a childโ€™s digital footprint as examples.
9. Parental control tools can be effective but may constrain childrenโ€™s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems โ€“ while presently fairly robust โ€“ cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australiaโ€™s standards and conformance infrastructure.
:::



Australiaโ€™s government trial of ageโ€‘assurance tech to keep underโ€‘16s off social media says social media age checks can be done, despite errors and privacy risks


Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia โ€“ our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the projectโ€™s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trialโ€™s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a childโ€™s digital footprint as examples.
9. Parental control tools can be effective but may constrain childrenโ€™s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems โ€“ while presently fairly robust โ€“ cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australiaโ€™s standards and conformance infrastructure.
:::




Australiaโ€™s government trial of ageโ€‘assurance tech to keep underโ€‘16s off social media says social media age checks can be done, despite errors and privacy risks


cross-posted from: programming.dev/post/36686657

Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia โ€“ our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the projectโ€™s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trialโ€™s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a childโ€™s digital footprint as examples.
9. Parental control tools can be effective but may constrain childrenโ€™s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems โ€“ while presently fairly robust โ€“ cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australiaโ€™s standards and conformance infrastructure.
:::



Australiaโ€™s government trial of ageโ€‘assurance tech to keep underโ€‘16s off social media says social media age checks can be done, despite errors and privacy risks


Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia โ€“ our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the projectโ€™s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trialโ€™s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a childโ€™s digital footprint as examples.
9. Parental control tools can be effective but may constrain childrenโ€™s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems โ€“ while presently fairly robust โ€“ cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australiaโ€™s standards and conformance infrastructure.
:::




็ฅž็คพใ‚’ๆ•ฃๆญฉใ—ใฆใ‚‹ใŒใ€็ตๆง‹้›ฐๅ›ฒๆฐ—ใ‚ใ‚‹
in reply to ไธŽๅนณ_GX

ใ“ใฎ็”ปๅƒใฏใ€ๅคœใฎ้™ใ‹ใชๅฐ้“ใ‚’ๆ‰ใˆใฆใ„ใพใ™ใ€‚้“ใฎไธกๅดใซใฏๆœจใ€…ใŒ็ซ‹ใกไธฆใณใ€ใใฎ้–“ใ‹ใ‚‰ๆŸ”ใ‚‰ใ‹ใชๅ…‰ใŒๆผใ‚Œใฆใ„ใพใ™ใ€‚้“ใฎๅณๅดใซใฏใ€่ตคใ„ๅก€ใŒ่ฆ‹ใˆใ€ใใฎๅ‘ใ“ใ†ใซใฏๅปบ็‰ฉใŒ่ฆ‹ใˆใพใ™ใ€‚้“ใฎไธญๅคฎใซใฏใ€ๆœจ่ฃฝใฎใƒใƒผใƒซใซๅ–ใ‚Šไป˜ใ‘ใ‚‰ใ‚ŒใŸ็…งๆ˜ŽใŒ่จญ็ฝฎใ•ใ‚ŒใฆใŠใ‚Šใ€ใใฎๅ…‰ใŒ้“ใ‚’็…งใ‚‰ใ—ใฆใ„ใพใ™ใ€‚้ ใใซใฏใ€ใ‚ใšใ‹ใซๅ…‰ใŒ่ฆ‹ใˆใ€่ปŠใฎใƒ˜ใƒƒใƒ‰ใƒฉใ‚คใƒˆใŒๅๅฐ„ใ—ใฆใ„ใ‚‹ใ‚ˆใ†ใซ่ฆ‹ใˆใพใ™ใ€‚ๅ…จไฝ“็š„ใซใ€้™ใ‹ใง่ฝใก็€ใ„ใŸ้›ฐๅ›ฒๆฐ—ใŒๆผ‚ใฃใฆใ„ใพใ™ใ€‚

@altbot ใซใ‚ˆใฃใฆๆไพ›ใ•ใ‚Œใ€Ovis2-8B ใ‚’ไฝฟ็”จใ—ใฆใƒญใƒผใ‚ซใƒซใงใƒ—ใƒฉใ‚คใƒ™ใƒผใƒˆใซ็”Ÿๆˆใ•ใ‚Œใพใ—ใŸ

๐ŸŒฑ ใ‚จใƒใƒซใ‚ฎใƒผไฝฟ็”จ้‡: 0.160 Wh



๐Ÿ“ท 01/09/2025

All'alba, il mare!
โœ๏ธOsservare il mare non mi stanca, anzi non mi basta mai, per questo poi fuggo, per non soffrire...
Il mare รจ un enigma, un'eterna danza tra onde, zampilli, gocce, e le sue innumerevoli creature... รˆ un palcoscenico senza fine in cui si alternano e poi si intrecciano
i pensieri in fuga, le illusioni, le delusioni e si affidano i sogni per farne spettacoli!

Nel suo abbraccio materno e avvolgente ci si abbandona e lรฌ che si annidano le paure di un cuore ferito, di un' anima in pena e di un corpo malato!
Cosรฌ nella burrasca, tra onde che ci sovrastano, ci confondono, ritroviamo il nostro faro, la speranza, i ricordi passati, la nostra alba!
Nell'azzurro immenso, a volte condiviso col cielo, si intrecciano con voli di gabbiani,
gioie e dolori, perchรฉ
il mare ci accoglie, ci rinnova ci infonde speranza! Cosi le onde, come battiti di un cuore antico, nascondono segreti e attraverso le note del suo canto,
ci invitano a sognare, a perderci,
in questa immensitร  che ci rende finalmente liberi e leggeri.
(By Marty)

reshared this



#RSF and #Avaaz launch international media operation: โ€œAt the rate #journalists are being killed in #Gaza by the #Israeli #army, there will soon be no one left to keep you informedโ€


Hundreds of media outlets, brought together by the campaigning platform Avaaz and Reporters Without Borders (RSF), are waging a campaign calling for the protection of #Palestinian #journalists in Gaza, the emergency evacuation of reporters seeking to leave the Strip, an end to impunity for Israeli crimes against Gazaโ€™s reporters and that foreign press be granted independent access to the territory.

(...)

More about

#PressFreedom #Journalismisnotacrime






Apple Hints That iPhone 17 Is to Eliminate the Physical SIM Card cybersecuritynews.com/iphone-1โ€ฆ #TechNews #Apple


Metalhead Wishes Suburban Moms Would Be As Afraid of Him As They Are of Black Family Enjoying a Picnic
thehardtimes.net/culture/metalโ€ฆ

"KENILWORTH, Ill. โ€” Local metalhead Travis Garnette was dejected after failing to scare unsuspecting suburbanites while wandering around Lovelace Park earlier this week, unshaken witnessesโ€ฆ
The post Metalhead Wishes Suburban Moms Would Be As Afraid of

โ‡ง