Salta al contenuto principale



Headlines say Vegas is dead. What’s actually going on is more complicated – The Nevada Independent

Headlines say Vegas is dead. What’s actually going on is more complicated.


Tourism leaders say a boost in conventions and major events will revive the Strip, which could be headed toward its first major downturn since the pandemic.

By Howard Stutz, Oona Milliken, and Kiara Adams

August 31st, 2025 at 2:00 AM, Economy Gaming
A couple watches the Bellagio Fountains on the Strip on Aug. 26, 2025. (Jeff Scheid / The Nevada Independent)
For the past 25 years, Cleveland residents Esther and Tom McElhinney have regularly vacationed in Las Vegas. But the couple said the high prices and overall experience is getting worse every time. Tom McElhinney said the Strip’s elevated costs are driving them away.

“The food is expensive, hotels are expensive,” Tom McElhinney said standing between Harrah’s Las Vegas and The Linq. “There’s great stuff to do here. I just don’t want to have to pay $400 for every meal. There used to be bargains and going to buffets, but it seems like those are all disappearing.

“You used to be able to play $5 blackjack everywhere, but now everything is high,” Tom McElhinney continued. “The allure here is gone. Vegas is really pricing people out.”

Strip resort operators are facing the industry’s worst economic downturn since the Great Recession 15 years ago. Gaming revenue at Strip resorts has declined in four of the last seven months and is essentially flat compared to 2024. Despite optimism from casino CEOs, analysts expect the Strip to face ongoing challenges into the fall.

There are also fewer Las Vegas visitors. Through July, the Strip has drawn more than 22.6 million visitors, down by 2 million from a year ago, an 8 percent decline.

Labor Day weekend, normally one of the year’s busiest holidays, is expected to see a nearly 2 percent drop in visitation, according to the Las Vegas Convention and Visitors Authority. The three-day weekend is expected to draw 320,000 visitors, down from 326,000 a year ago.

One challenge facing resort operators is the message on social media and other platforms is that Las Vegas is overpriced and no longer a value to the travel consumer.

Chicago visitor Patty Steiner said she usually comes every year to Las Vegas. But she’s not making plans to come back in 2026, as airline tickets and other expenses have gone up in cost.

“Everything is high. I just feel like it’s going to be a long road,” Steiner said. “The prices are outrageous. The food is crazy. I’m just very unhappy.”

Las Vegas Convention and Visitors Authority CEO Steve Hill said he doesn’t believe in that narrative. At a media briefing Friday, Hill defended Las Vegas as a value destination and said the market has options to suit all consumers.

“Don’t just believe what you read. Go and do a little bit of work,” Hill said. “Call a travel agent, call on the properties. See what the price of Las Vegas really is, rather than some general headline that, frankly, is not accurate.”

Editor’s Note: Read the rest of the story, at the below link.

Continue/Read Original Article Here: Headlines say Vegas is dead. What’s actually going on is more complicated. – The Nevada Independent

#2025 #America #Health #History #LasVegas #Libraries #Opinion #Technology #TheNevadaIndependent #Travel #UnitedStates

Questa voce è stata modificata (3 settimane fa)


Instagramが展開中のジョーク

アプリ:♥ボタンに新着赤点が点かない
ウェブ:♥ボタンに新着赤点が点くが、そこをクリックして出るいいね!してくれた人々一覧からジャンプできなくなり、自分のどの作品にいいね!をもらったのか判らなくなった

面白くないぞ #企業ジョーク #instagram




Thanks to @OSNews for highlighting this 2023 LWN post by Lars Wirzenius on his experiences during the very earliest days of Linux and the time leading up to it. #linux #history #ComputerHistory

lwn.net/Articles/928581/


in reply to The Conversation UK

We enjoyed it somewhat but yes, the script was weak. Especially for the calibre of actors!


Galaxy Watch6, Watch7, and Watch Ultra LTE receive August 2025 security update in India!


Samsung has just released the August 2025 security patch in India for the LTE version of Galaxy Watch6, Watch7, and Watch Ultra (2024 original and 2025 reboot). This patch enhances your smartwatch’s security to make sure that you and your data are kept secure. This aligns with the quarterly cadence of the software update scheduling for five years of security updates and four generations of system updates.

The following firmware information is available:

  • SM-L705F: L705FXXU1BYH6 [INS]
  • SM-L315F: L315FXXU1AYH1 [INS]
  • SM-L305F: L305FXXU1AYH1 [INS]
  • SM-R965F: R965FXXS1BYH1 [INS]
  • SM-R955F: R955FXXS1BYH1 [INS]
  • SM-R945F: R945FXXS1BYH1 [INS]
  • SM-R935F: R935FXXS1BYH1 [INS]

You can now update your smartwatch, but if you still didn’t receive any update, you’ll have to wait for a few days as this rollout is a gradual rollout that starts from Korea. You can periodically check for updates to see if this update has reached your device. We recommend that you update your watch manager in your phone to ensure compatibility with the latest software.

To update your watch, follow these steps:

  • With your phone
    1. Open Galaxy Wearable
    2. Select your watch
    3. Open Watch settings
    4. Navigate to Software Update
    5. Tap Download and Install
    6. Wait until the update shows up, then press Download
    7. Wait until the update gets downloaded and copied to your watch, then press Install


  • With your watch
    1. Open Settings
    2. Navigate to Software update
    3. Tap Download and Install
    4. Wait until the update shows up, then press Download
    5. Wait until it gets downloaded to your watch, then press Install


In an event that something went wrong with copying the update, disconnect your phone from your watch by turning Bluetooth off or by disconnecting it through Galaxy Wearable, then try again from your watch. Make sure to turn Wi-Fi on in your watch to download the update faster.

Make sure that both your phone and your watch are charged before performing the update, and that your internet connection is stable. Never interrupt the update process, or there could be problems later. The update process may take a few minutes to finish, and if it appears to be stuck, just wait for more minutes.

#Android #Android14 #GalaxyWatch6 #GalaxyWatch6Classic #news #oneUi #OneUI6 #OneUI6Watch #Samsung #SamsungGalaxyWatch6 #SamsungGalaxyWatch6Classic #Tech #Technology #update #Watch6 #Watch6Classic


Galaxy Watch7 and Watch6 Manager Update (April 2025)


Today, Samsung has rolled out the Galaxy Watch7 Manager and the Galaxy Watch6 Manager update globally as they’re working on an update for both smartwatches. You can now download the update through Galaxy Wearable > Devices > Menu > Settings > About. If there is an update available for your device, you should see the update button as below:

The download size for this update is 155 MB, depending on the smartwatch model. Once the update is downloaded, you’ll be able to experience the new version of the Galaxy Wearable app and its manager plugins for your watch. This is done to improve reliability and performance, ensuring that you will be able to interact with your smartwatch more efficiently.

After the update, the following versions will be used:

  • Galaxy Wearable: 2.2.61.24112961
  • Galaxy Watch6 Manager: 2.2.13.25033151
  • Galaxy Watch7 Manager: 2.2.15.25010651

This update is necessary to align with the One UI 7 design elements.

#Android #GalaxyWatch6 #GalaxyWatch7 #GalaxyWatch6 #GalaxyWatch6Classic #GalaxyWatch7 #news #oneUi #OneUIWatch6 #Samsung #SamsungGalaxyWatch6 #SamsungGalaxyWatch7 #SamsungGalaxyWatch6 #SamsungGalaxyWatch6Classic #SamsungGalaxyWatch7 #smartwatch #Tech #Technology #update #Watch #Watch6 #Watch7 #Watch6 #Watch6Classic #Watch7 #Wearable




This was my very first photo with the #Pentax 17 on our summer trip. We were already in Italy, spending the night in a suburb of #Milan. As it was getting dark, we walked to a pizzeria. Across the street, I spotted this completely worn-out poster, with only the face of a woman still visible. I have no idea what or who it originally advertised. (Anyone from Milan recognize it?) It looked like an official #billboard, maybe even from the elections… Hopefully not the fascists, because I hate them. Otherwise, I find the decay of images and material absolutely fascinating.

#Italy ...

It’s become something of a yearly tradition.
And I decided to create an Italy collection.

pixelfed.social/c/859471472028…

Italian #art #photography with a #halfframe #pentax17

#analog is timeless.
#filmphotography #kodak #photography #ishootfilm #grainisgood #halfframe #pentax #halfframeclub #analogphotography




How Aaron Burr Fathered America's Deep State with London's Whore of Babylon matthewehret.substack.com/p/ho…


in reply to 🌒🌕🌘Aetherius Eldritch🧙‍♂️⚡

La imagen es un meme dividido en dos partes. En la parte izquierda, se muestra a un hombre con una expresión seria, vestido con un traje oscuro y una camisa blanca, con el logo de "X" (anteriormente conocido como Twitter) en el centro. El texto en la parte superior dice: "USO ALGORITMOS, SOY RESTRICTIVO Y CENSURO MEDIOS QUE NO SIGAN MIS IDEAS." En la parte derecha, hay una imagen de un hombre con barba, mirando hacia arriba con una expresión relajada, vestido con una camiseta azul, con el logo de "Mastodon" en el centro. El texto en la parte inferior dice: "LA COSA ES TRANQUILA, RELAX, SIN ALGORITMOS Y PUEDES PUBLICAR SIN PROBLEMA." La imagen compara las políticas de algoritmos y censura de Twitter con la plataforma de Mastodon, sugiriendo que Mastodon es más abierta y sin restricciones.

Proporcionado por @altbot, generado de forma privada y local usando Ovis2-8B

🌱 Energía utilizada: 0.225 Wh




Samsung releases the August 2025 security patch for Watch6, Watch7, and Watch Ultra LTE in India!

#Samsung #Galaxy #OneUI6 #TechNews #TechUpdates #GalaxyWatch6 #GalaxyWatch7 #GalaxyWatchUltra

officialaptivi.wordpress.com/2…



Primo lungo giro in FX con utilizzo EV6 per ricarica d'emergenza: il primo lungo giro (180 km) in cui avevamo la EV6 con l'idea di non doverla usare per la ricarica, ma solo in caso di emergenza... come infatti è avvenuto forumelettrico.it/forum/primo-… #zero #fx #kia #ev6
#zero #fx #kia #ev6


Il giornalista Maurizio Molinari elogia il progetto Riviera Gaza, che a suo dire mostra "la determinazione del presidente Trump a procedere nella ricostruzione civile della Striscia". E questa dichiarazione mostra la determinazione di Maurizio Molinari a procedere nell'affossamento della sua credibilità.

@attualita

Unknown parent

mastodon - Collegamento all'originale
L'Ideota
@Otttoz
Il problema secondo me è rappresentato da tutti questi. Una cosa non esclude l'altra...




Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


cross-posted from: programming.dev/post/36686657

Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::



Australia’s government trial of age‑assurance tech to keep under‑16s off social media says social media age checks can be done, despite errors and privacy risks


Main Report.

::: spoiler 12 Key Findings
1. Age assurance can be done in Australia privately, efficiently and effectively: Age assurance can be done in Australia – our analysis of age assurance systems in the context of Australia demonstrates how they can be private, robust and effective. There is a plethora of choice available for providers of age-restricted goods, content, services, venues or spaces to select the most appropriate systems for their use case with reference to emerging international standards for age assurance.
2. No substantial technological limitations preventing its implementation to meet policy goals: Our evaluation did not reveal any substantial technological limitations that would prevent age assurance systems being used in response to age-related eligibility requirements established by policy makers. We identified careful, critical thinking by providers on the development and deployment of age assurance systems, considering efficacy, privacy, data and security concerns. Some systems were easier for initial implementation and use than others, but the systems of all technology providers with a technology readiness level (TRL) 7 or above were eventually capable of integration to a user journey.
3. Provider claims have been independently validated
against the project’s evaluation criteria
: We found that the practice statements provided by age assurance providers with a TRL of 7 or above fairly reflected the technological capabilities of their products, processes or services (to the extent applicable to the Trial’s evaluation criteria). Some of the practice statements provided have needed to be clarified or developed during the course of the Trial, but we observed that they offer a useful option for transparency of the capabilities of the available age assurance systems. Those with a TRL below 7 will need further analysis when their systems mature.
4. A wide range of approaches exist, but there is no one-size-fits-all solution for all contexts: We found a plethora of approaches that fit different use cases in different ways, but we did not find a single ubiquitous solution that would suit all use cases, nor did we find solutions that were guaranteed to be effective in all deployments. The range of possibilities across the Trial participants demonstrate a rich and rapidly evolving range of services which can be tailored and effective depending on each specified context of use.
5. We found a dynamic, innovative and evolving age assurance service sector: We found a vibrant, creative and innovative age assurance service sector with both technologically advanced and deployed solutions and a pipeline of new technologies transitioning from research to minimum viable product to testing and deployment stages indicating an evolving choice and future opportunities for developers. We found private-sector investment and opportunities for growth within the age assurance services sector.
6. We found robust, appropriate and secure data handling practices: We found robust understanding of and internal policy decisions regarding the handling of personal information by Trial participants. The privacy policies and practice statements collated for the Trial demonstrate a strong commitment to privacy by design principles, with consideration of what data was to be collected, stored, shared and then disposed of. Separating age assurance services from those of relying parties was useful as Trial participants providing age assurance services more clearly only used data for the necessary and consented purpose of providing an age assurance result.
7. Systems performed broadly consistently across demographic groups, including Indigenous populations: The systems under test performed broadly consistently across demographic groups assessed and despite an acknowledged deficit in training age analysis systems with data about Indigenous populations, we found no substantial difference in the outcomes for First Nations and Torres Strait Islander Peoples and other multi-cultural communities using the age assurance systems. We found some systems performed better than others, but overall variances across race did not deviate by more than recognised tolerances.
8. There is scope to enhance usability, risk management and system interoperability: We found opportunities for technological improvement including improving ease of use for the average person and enhancing the management of risk in age assurance systems. This could include through one-way blind access to verification of government documents, enabling connection to data holder services (like digital wallets) or improving the handling of a child’s digital footprint as examples.
9. Parental control tools can be effective but may constrain children’s digital participation and evolving autonomy: The Trial found that both parental control and consent systems can be done and can be effective, but they serve different purposes. Parental control systems are pre-configured and ongoing but may fail to adapt to the evolving capacities of children including potential risks to their digital privacy as they grow and mature, particularly through adolescence. Parental consent mechanisms prompt active engagement between children and their parents at key decision points, potentially supporting informed access.
10. Systems generally align with cybersecurity best practice, but vigilance is required: We found that the systems were generally secure and consistent with information security standards, with developers actively addressing known attack vectors including AI-generated spoofing and forgeries. However, the rapidly evolving threat environment means that these systems – while presently fairly robust – cannot be considered infallible. Ongoing monitoring and improvement will help maintain their effectiveness over time. Similarly, continued attention to privacy compliance will support long-term trust and accountability.
11. Unnecessary data retention may occur in apparent anticipation of future regulatory needs: We found some concerning evidence that in the absence of specific guidance, service providers were apparently over-anticipating the eventual needs of regulators about providing personal information for future investigations. Some providers were found to be building tools to enable regulators, law enforcement or Coroners to retrace the actions taken by individuals to verify their age which could lead to increased risk of privacy breaches due to unnecessary and disproportionate collection and retention of data.
12. Providers are aligning to emerging international standards around age assurance: The standards-based approach adopted by the Trial, including through the ISO/IEC 27566 Series [Note 1], the IEEE 2089.1 [Note 2] and the ISO/IEC 25000 [Note 3] series (the Product Quality Model) all provide a strong basis for the development of accreditation of conformity assessment and subsequent certification of individual age assurance providers in accordance with Australia’s standards and conformance infrastructure.
:::


in reply to Pro

Its really gonna be over isnt it. The anonymous free web is actually dying. Rip www you were quite shit but had some good moments.

Nz is definitely going to follow aus and the uk. Our bald egghead pm has expressed a lot of interest in this idea.

in reply to Pro

so much fluff in their findings. makes me think, they didnt research shit.
this is gonna be terribly implemented.

their attempt wont be the end of the free web. but people will leave because they dont want their data breached by yet another bad actor. its just making the web more dangerous instead of safer.

no one has the tech and security to handle this. its waaaay too early. the breaches are going to substantial and continuous.

good luck Australia. stay safe.





China’s chip startups are racing to replace Nvidia


cross-posted from: programming.dev/post/36693771


China’s chip startups are racing to replace Nvidia


Technology reshared this.

in reply to Pro

Software like wgpu makes it much easier to close the gap between various GPUs. New compute languages that are backend-agnostic are appearing, in the same vein as taichi-lang, that make it significantly easier to make high-performance gpu kernels deployable anywhere.

The compute groundwork for crossplatform tensor calculations is already here. Inference is already doable on any device. Training is not far behind. As a side-effect of this, processing on the GPU in every capacity, like physics, novel rendering techniques, or whatever else the imagination can muster, is now within grasp of "average" programmers.

If you have always been intimidated by GPU programming, I urge you to take another look now. The landscape is radically different. The software moat everyone talks about with NVIDIA is smoke-and-mirrors. Cuda is old news, though I am speaking to the actual code landscape here, not the common mental consensus.

What we lack now is cheap video cards that have high memory. I believe the current cards are overpriced by about 10 - 100x what they should be, because this profit situation is extremely temporary. Just as pens were once thousands of dollars, these compute devices will be collapsing in price.

I welcome China building cheaper video cards. Hopefully we will all benefit from it before any robot wars break out.

in reply to Pro

Weird article IMO??? Forget the startups, unless they are backed by very major players they don't stand a chance. They have their competences, but I seriously doubt competing with Nvidia on making AI chips is among them.
The players to watch are Huawei, Baidu, Tencent and the likes. Who have already been working on this for a while, and have actual working and useful products.

While Huawei is the leader, Chinese companies don’t want to rely entirely on the company.


I don't understand how that statement is supposed to make much sense? When Chinese companies were happy using Nvidia and being dependent on Nvidia. Why wouldn't they be equally happy using Huawei if it's the best option after the government has forbidden them from using Nvidia?
It may be true, but there is zero explanation why it is.

To the ones that think China can just use AMD instead, they really can't, AMD is under the same restrictions Nvidia is, and AFAIK AMD has not designed a chip to sell to China within those restrictions.

Questa voce è stata modificata (3 settimane fa)


Makali, le doyen de Lola ya Bonobo, s’est éteint 💔
paroledanimaux.fr/makali-le-do…
"Makali est arrivé à Lola ya Bonobo le 28 février 2004, en compagnie de trois autres bonobos – Etumbe, Tshilomba et Keza – transférés de l’Institut National de Recherche Biomédicale de Kinshasa. Leur arrivée fut un moment marquant de l’histoire du sanctuaire : un enclos entier, l’enclos 3, avait été construit spécialement pour eux.
The post Makali, le doyen


Wordle 1,536 5/6

⬛⬛⬛⬛⬛
⬛⬛⬛⬛🟨
🟨🟨🟨⬛⬛
⬛🟩🟨🟩⬛
🟩🟩🟩🟩🟩
やられた。箸にも棒にも… #x

#x


Je länger ich Friedrich Merz mit seiner Union an der Regierung zuschaue, desto mehr bin an diese massive Blockade und Zerstörungswut der FDP in der alten Ampel erinnert, die dort noch von den Grünen oft eingedämmt werden konnte.

Hier ist diese Zerstörungswut aber an der Regierung und bereitet den fruchtbarsten Boden für die Faschisten vor, die unsere Demokratie, unseren Wohlstand, unseren Frieden und unsere Gesellschaft in das absolute Chaos führen werden.

Und uns in eine russische Sklavengesellschaft treiben. So wie die Russen es mit der Ukraine vorhaben.

Aber vielleicht ist das Klima ja schneller und macht uns vorher den Garaus.
Die Chancen dazu stehen im hochprozentigen Bereich.



EU-Kommissionschefin von der Leyen kann Messages zwischen ihr und Macron nicht auf Informationsfreiheitsanfragen hin herausgeben. Grund: automatisches Löschen. #EU

Signal-Messenger: Von der Leye...

#eu




“To all those families who have been separated or threatened with family separation, I want to tell you something,” Kilmar told a large crowd of supporters. “God is w/us. God will never leave us. God will bring justice to all the injustice we are suffering." open.substack.com/pub/americas… #FreeKilmar


DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally


cross-posted from: programming.dev/post/36689630

::: spoiler Key Findings
1. Geopolitical Events Trigger Unprecedented DDoS Campaigns
Expand
: Major political events drove increased DDoS activity, evidenced by attack count spikes that coincide with these occurrences. These events saw hacktivist groups launching up to double the normal number of attacks in short timeframes.
2. Botnet-Driven Attacks Dominate with Increased Sophistication
Expand
: Botnet-driven attacks are getting longer, more frequent, and are employing multiple attack vectors to avoid mitigation. They are targeting known vulnerabilities in IoT devices, servers, routers, and more.
3. NoName057(16) Maintains Dominance Among Familiar Threat Actors: Well-known hacktivist and attack groups, such as NoName057(16), are launching more attacks across the globe while leveraging several attack vectors.
4. New Threat Actors Emerge with DDoS-as-a-Service Capabilities: Emerging attack groups like DieNet and Keymous+ are leveraging DDoS-for-hire infrastructure to launch DDoS-as-a-service campaigns, lowering the barrier to entry and expanding the threat landscape.
5. Global DDOS Attack Volume High with Regional Variations: With more than 8 million recorded attacks globally in the first half of 2025, DDoS attack volume remains massive. The attacks also show sustained intensity, reaching speeds of 3.12 Tbps and 1.5 Gpps.
:::
DDoS attacks are no longer just a nuisance, they’re a weapon of geopolitical influence. In the first half of 2025 alone, more than 8 million attacks were recorded globally, with threat actors leveraging AI, botnets, and DDoS-for-hire services to launch increasingly sophisticated and sustained campaigns.

::: spoiler Report Highlights
- DDoS-Capable
Botnets
;
- Country
Analysis
;
- DDoS Attack
Vectors
;
- Global
Highlights
;
- Industry
Analysis
.
:::



DDoS Dominate the Digital Battlefield: AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally


::: spoiler Key Findings
1. Geopolitical Events Trigger Unprecedented DDoS Campaigns
Expand
: Major political events drove increased DDoS activity, evidenced by attack count spikes that coincide with these occurrences. These events saw hacktivist groups launching up to double the normal number of attacks in short timeframes.
2. Botnet-Driven Attacks Dominate with Increased Sophistication
Expand
: Botnet-driven attacks are getting longer, more frequent, and are employing multiple attack vectors to avoid mitigation. They are targeting known vulnerabilities in IoT devices, servers, routers, and more.
3. NoName057(16) Maintains Dominance Among Familiar Threat Actors: Well-known hacktivist and attack groups, such as NoName057(16), are launching more attacks across the globe while leveraging several attack vectors.
4. New Threat Actors Emerge with DDoS-as-a-Service Capabilities: Emerging attack groups like DieNet and Keymous+ are leveraging DDoS-for-hire infrastructure to launch DDoS-as-a-service campaigns, lowering the barrier to entry and expanding the threat landscape.
5. Global DDOS Attack Volume High with Regional Variations: With more than 8 million recorded attacks globally in the first half of 2025, DDoS attack volume remains massive. The attacks also show sustained intensity, reaching speeds of 3.12 Tbps and 1.5 Gpps.
:::

DDoS attacks are no longer just a nuisance, they’re a weapon of geopolitical influence. In the first half of 2025 alone, more than 8 million attacks were recorded globally, with threat actors leveraging AI, botnets, and DDoS-for-hire services to launch increasingly sophisticated and sustained campaigns.


::: spoiler Report Highlights
- DDoS-Capable
Botnets
;
- Country
Analysis
;
- DDoS Attack
Vectors
;
- Global
Highlights
;
- Industry
Analysis
.
:::




Wait - “America's leading physician groups are now openly defying a fucking lawyer and conspiracy theorist. U.S. vaccine consensus has officially shattered." There. I fixed it. 😀

reshared this



Unions are as popular as ever. Our labor laws haven't caught up yet. msnbc.com/opinion/msnbc-opinio… #1u
#1u


Signal-Messenger: Von der Leyen hat Auto-Delete für Nachrichten voreingestellt

EU-Kommissionschefin von der Leyen kann Messages zwischen ihr und Macron nicht auf Informationsfreiheitsanfragen hin herausgeben. Grund: automatisches Löschen.

heise.de/news/Signal-Messenger…

#EU #IT #Mobiles #Netzpolitik #Signal #news

reshared this

in reply to heise online

Deshalb muss für Amtsträger gelten: Verschlüsselungsverbot mit Bundestrojaner auf dem Endgerät und dauerhafte Datenausleitung.

WER ALS MANDATSTRÄGER NIX ZU VERBERGEN HAT, KANN DA NIX DAGEGEN HABEN!



Kinda feel like fleeing the US for the UK is like fleeing from the fire into a frying pan that's just reaching cooking temperature

But then I guess Fascism only happens to the Poor...until it doesn't.

faroutmagazine.co.uk/robin-wri…

#Fascism #RefugeesWelcome #UK #USA #Politics




US wine sellers left in limbo despite EU tariff deal

Michael Warner, co-founder of wine boutique DCanter, said importers and distributors have raised costs of foreign wines since June – Copyright AFP SAUL LOEB Beiyi SEOW At a wine shop in Washington’s Capitol Hill neighborhood, b…
#wine #AmericanWine #America #Americanwine #eu #Tariff #trade #UnitedStates #UnitedStatesWine #US #USWine #USAWine #Wine
diningandcooking.com/2261784/u…



Non capisco le persone che, in auto, scavalcano i dossi a meno di 20 km/h ("altrimenti si rovina l'assetto 😱"), poi sgasano a 70 e inchiodano prima del dosso successivo.

Io vado a 40 fissi, dossi o non dossi, e me ne fotto.

Mi piacerebbe affiancarli e dire loro, con sufficienza: "IO posso permettermi di rifare l'assetto una volta al mese¹", tanto per non dire "anche se hai il BMW rimani straccione dentro".

¹ non è vero, e non ho mai fatto l'assetto, frega niente.

reshared this

in reply to rag. Gustavino Bevilacqua

o come quelli che in rettilineo ti stanno incollati dietro con i loro macchinoni e appena c'è una curva rimangono indietro, perché non sanno affrontarla bene, poi appena la strada torna dritta ti si riattaccano di nuovo.
in reply to kappazeta

Qui ci sono quelli che hanno paura che le curve li mordano… e non dimentichiamo quelli che guidano guardando il mare 🤬
Questa voce è stata modificata (3 settimane fa)
in reply to rag. Gustavino Bevilacqua

Sensitive content

Questa voce è stata modificata (3 settimane fa)

reshared this

in reply to SparkIT

@sparkit @rapitadaglialieni @kappazeta

Però bisogna dire che in Liguria ci sono località con nomi particolarmente evocativi: Portofino… Sanremo…

reshared this

in reply to kappazeta

@kappazeta youtube.com/shorts/st8tff2nxXQ…



Dans les pays du Sahel, les juntes en échec face aux djihadistes
monde-diplomatique.fr/2025/09/…

"En une décennie, le Sahel a complètement changé. Les coups d'État (Mali, Burkina Faso, Niger), d'abord présentés comme des réponses temporaires à la crise sécuritaire, semblent installer durablement des régimes autoritaires. Au-delà du rejet commun de la présence française, ces nouveaux pouvoirs (...)
/ Sahel, Terrorisme, Mali, Coup d'État, Autoritarisme, Géopolitique,




Incidente sul lavoro a Loano: operaio precipita dal tetto e muore liberoreporter.it/2025/09/flas…