Salta al contenuto principale



…e se Epstein fosse stato suicidato per nascondere scomode verià?


USB-C-ing All The Things


Wall warts. Plug mounted power supplies that turn mains voltage into low voltage DC on a barrel jack to power a piece of equipment. We’ve all got a load of them for our various devices, most of us to the extent that it becomes annoying. [Mikeselectricstuff] has the solution, in the shape of a USB-C PD power supply designed to replace a barrel jack socket on a PCB.

The video below provides a comprehensive introduction to the topic before diving into the design. The chip in question is the CH224K, and he goes into detail on ordering the boards for yourself. As the design files are freely available, we wouldn’t be surprised if they start turning up from the usual suppliers before too long.

We like this project and we can see that it would be useful, after all it’s easy to end up in wall wart hell. We’ve remarked before that USB-C PD is a new technology done right, and this is the perfect demonstration of its potential.

youtube.com/embed/BElU9LPbaA8?…


hackaday.com/2025/07/22/usb-c-…



Power Grid Stability: From Generators to Reactive Power


It hasn’t been that long since humans figured out how to create power grids that integrated multiple generators and consumers. Ever since AC won the battle of the currents, grid operators have had to deal with the issues that come with using AC instead of the far less complex DC. Instead of simply targeting a constant voltage, generators have to synchronize with the frequency of the alternating current as it cycles between positive and negative current many times per second.

Complicating matters further, the transmission lines between generators and consumers, along with any kind of transmission equipment on the lines, add their own inductive, capacitive, and resistive properties to the system before the effects of consumers are even tallied up. The result of this are phase shifts between voltage and current that have to be managed by controlling the reactive power, lest frequency oscillations and voltage swings result in a complete grid blackout.

Flowing Backwards


We tend to think of the power in our homes as something that comes out of the outlet before going into the device that’s being powered. While for DC applications this is essentially true – aside from fights over which way DC current flows – for AC applications the answer is pretty much a “It’s complicated”. After all, the primary reason why we use AC transmission is because transformers make transforming between AC voltages easy, not because an AC grid is easier to manage.
Image showing the instantaneous electric power in AC systems and its decomposition into active and reactive power; when the current lags the voltage 50 degrees. (Credit: Jon Peli Oleaga)Image showing the instantaneous electric power in AC systems and its decomposition into active and reactive power; when the current lags the voltage 50 degrees. (Credit: Jon Peli Oleaga)
What exactly happens between an AC generator and an AC load depends on the characteristics of the load. A major part of these characteristics is covered by its power factor (PF), which describes the effect of the load on the AC phase. If the PF is 1, the load is purely resistive with no phase shift. If the PF is 0, it’s a purely reactive load and no net current flows. Most AC-powered devices have a power factor that’s somewhere between 0.5 to 0.99, meaning that they appear to be a mixed reactive and resistive load.
The power triangle, showing the relationship between real, apparent and reactive power. (Source: Wikimedia)The power triangle, showing the relationship between real, apparent and reactive power. (Source: Wikimedia)
PF can be understood in terms of the two components that define AC power, being:

  • Apparent Power (S, in volt-amperes or VA) and
  • Real Power (P, in watts).

The PF is defined as the ratio of P to S (i.e. `PF = P / S). Reactive Power (Q, in var) is easily visualized as the angle theta (Θ) between P and S if we put them as respectively the leg and hypotenuse of a right triangle. Here Θ is the phase shift by which the current waveform lags the voltage. We can observe that as the phase shift increases, the apparent power increases along with reactive power. Rather than being consumed by the load, reactive power flows back to the generator, which hints at why it’s such a problematic phenomenon for grid-management.

From the above we can deduce that the PF is 1.0 if S and P are the same magnitude. Although P = I × V gets us the real power in watts, it is the apparent power that is being supplied by the generators on the grid, meaning that reactive power is effectively ‘wasted’ power. How concerning this is to you as a consumer mostly depends on whether you are being billed for watts or VAs consumed, but from a grid perspective this is the motivation behind power factor correction (PFC).

This is where capacitors are useful, as they can correct the low PF on inductive loads like electric motors, and vice versa with inductance on capacitive loads. As a rule of thumb, capacitors create reactive power, while inductors consume reactive power, meaning that for PFC the right capacitance or inductance has to be added to get the PF as close to 1.0 as possible. Since an inductor absorbs the excess (reactive) power and a capacitor supplies reactive power, if both are balanced 1:1, the PF would be 1.0.

In the case of modern switching-mode power supplies, automatic power factor correction (APFC) is applied, which switch in capacitance as needed by the current load. This is, in miniature, pretty much what the full-scale grid does throughout the network.

Traditional Grids

Magnetically controlled shunt reactor (MCSR). (Credit: Tayosun, Wikimedia)Magnetically controlled shunt reactor (MCSR). (Credit: Tayosun, Wikimedia)
Based on this essential knowledge, local electrical networks were expanded from a few streets to entire cities. From there it was only a matter of time before transmission lines turned many into few, with soon transmission networks spanning entire continents. Even so, the basic principles remain the same, and thus the methods available to manage a power grid.

Spinning generators provide the AC power, along with either the creation or absorption of reactive power on account of being inductors with their large wound coils, depending on their excitation level. Since transformers are passive devices, they will always absorb reactive power, while both overhead and underground transmission lines start off providing reactive power, overhead lines start absorbing reactive power if overloaded.

In order to keep reactive power in the grid to a healthy minimum, capacitive and inductive loads are switched in or out at locations like transmission lines and switchyards. The inductive loads often taken the form of shunt reactors – basically single winding transformers – and shunt capacitors, along with active devices like synchronous condensers that are effectively simplified synchronous generators. In locations like substations the use of tap changers enables fine-grained voltage control to ease the load on nearby transmission lines. Meanwhile the synchronous generators at thermal plants can be kept idle and online to provide significant reactive power absorption capacity when not used to actively generate power.

Regardless of the exact technologies employed, these traditional grids are characterized by significant amounts of reactive power creation and absorption capacity. As loads join or leave the grid every time that consumer devices are turned off and on, the grid manager (transmission system operator, or TSO) adjusts the state of these control methods. This keeps the grid frequency and voltage within their respective narrowly defined windows.

Variable Generators


Over the past few years, most newly added generating capacity has come in the form of weather-dependent variable generators that use grid-following converters. These devices take the DC power from generally PV solar and wind turbine farms and convert them into AC. They use a phase-locked loop (PLL) to synchronize with the grid frequency, to match this AC frequency and the current voltage.

Unfortunately, these devices do not have the ability to absorb or generate reactive power, and instead blindly follow the current grid frequency and voltage, even if said grid was going through reactive power-induced oscillations. Thus instead of damping these oscillations and any voltage swings, these converters serve to amplify these issues. During the 2025 Iberian Peninsula blackout, this was identified as one of the primary causes by the Spanish TSO.

Ultimately AC power grids depend on solid reactive power management, which is why the European group of TSOs (ENTSO-E) already recommended in 2020 that grid-following converters should get replaced with grid-forming converters. These feature the ability absorb and generate reactive power through the addition of features like energy storage and are overall significantly more useful and robust when it comes to AC grid management.

Although AC doesn’t rule the roost any more in transmission networks, with high-voltage DC now the more economical option for long distances, the overwhelming part of today’s power grids still use AC. This means that reactive power management will remain one of the most essential parts of keeping power grids stable and people happy, until the day comes when we will all be switching back to DC grids, year after the switch to AC was finally completed back in 2007.


hackaday.com/2025/07/22/power-…



Arriva LameHug: il malware che utilizza l’AI per rubare i dati sui sistemi Windows


La nuova famiglia di malware LameHug utilizza il Large Language Model (LLM) per generare comandi che vengono eseguiti sui sistemi Windows compromessi. Come riportato da Bleeping Computer, LameHug è scritto in Python e utilizza l’API Hugging Face per interagire con il Qwen 2.5-Coder-32B-Instruct LLM, che può generare comandi in base ai prompt forniti. Si noti che l’utilizzo dell’infrastruttura Hugging Face può contribuire a garantire la segretezza delle comunicazioni e che l’attacco rimarrà inosservato per un periodo di tempo più lungo.

Questo modello, creato da Alibaba Cloud, èopen source e progettato specificamente per la generazione di codice, il ragionamento e l’esecuzione di istruzioni di programmazione. Può convertire descrizioni in linguaggio naturale in codice eseguibile (in più linguaggi) o comandi shell. LameHug è stato scoperto il 10 luglio di quest’anno, quando dipendenti delle autorità esecutive ucraine hanno ricevuto email dannose inviate da account hackerati.

Le email contenevano un archivio ZIP con il loader di LameHug, camuffato dai file Attachment.pif, AI_generator_uncensored_Canvas_PRO_v0.9.exe e image.py. Nei sistemi infetti, LameHug aveva il compito di eseguire comandi per effettuare ricognizioni e rubare dati generati dinamicamente tramite richieste a LLM.
Prompt per la generazione di comandi
Le informazioni di sistema raccolte venivano salvate in un file di testo (info.txt) e il malware cercava ricorsivamente documenti in cartelle come Documenti, Desktop, Download, per poi trasmettere i dati raccolti ai suoi operatori tramite richieste SFTP o HTTP POST. La pubblicazione sottolinea che LameHug è il primo malware documentato che utilizza LLM per eseguire attività dannose.

Sempre più spesso vediamo una preoccupante integrazione tra malware e intelligenza artificiale, che rende le minacce informatiche più sofisticate, flessibili e difficili da individuare. L’uso dei Large Language Model come “motori” per generare in tempo reale comandi dannosi permette agli attaccanti di adattarsi rapidamente, di diversificare le tecniche di attacco e di ridurre la rilevabilità da parte dei sistemi di difesa tradizionali.

LameHug rappresenta un chiaro esempio di questa nuova generazione di minacce: malware che non solo automatizzano le attività dannose, ma sono anche in grado di “ragionare” e rispondere dinamicamente agli input, sfruttando la potenza degli LLM. Un fenomeno che segna l’inizio di una nuova fase nelle minacce informatiche, in cui l’AI non è solo uno strumento difensivo, ma diventa parte integrante e attiva dell’arsenale offensivo dei cyber criminali.

L'articolo Arriva LameHug: il malware che utilizza l’AI per rubare i dati sui sistemi Windows proviene da il blog della sicurezza informatica.



Fuga di dati Louis Vuitton: 420.000 clienti coinvolti a Hong Kong


Secondo quanto riportato guancha.cn e da altri media, Louis Vuitton ha recentemente inviato una comunicazione ai propri clienti per informarli di una fuga di dati che ha interessato circa 420.000 clienti a Hong Kong. I dati trapelati comprendono nomi, numeri di passaporto, date di nascita, indirizzi, indirizzi email, numeri di telefono, registri degli acquisti e preferenze sui prodotti. Louis Vuitton Hong Kong (LVHK) ha specificato che non sono stati coinvolti dati relativi ai pagamenti e ha dichiarato di aver notificato tempestivamente l’accaduto sia alle autorità competenti sia ai clienti interessati.

A seguito dell’incidente, l’Ufficio del Commissario per la privacy dei dati personali di Hong Kong ha comunicato di aver avviato un’indagine per accertare i fatti e verificare, tra le altre cose, se vi sia stata una notifica tardiva da parte dell’azienda. Va inoltre sottolineato che dall’inizio dell’anno Louis Vuitton ha già subito diversi gravi incidenti legati alla sicurezza dei dati.

Secondo Lin Yue, consulente capo di Lingyan Management Consulting e analista del settore dei beni di consumo, le cause principali di questi incidenti ricorrenti sarebbero da ricercare nell’abitudine, da parte dei marchi del lusso, di raccogliere quantità eccessive di dati non sempre necessari, come numeri di passaporto, e in misure di protezione e tecnologie di sicurezza non all’altezza della sensibilità dei dati gestiti.

Chen Jingjing, fondatrice di Jingjie Interactive, ha aggiunto che questa vulnerabilità riflette uno squilibrio tra la rapida digitalizzazione del settore del lusso e gli investimenti ancora insufficienti in sicurezza informatica: i marchi sono bravi a comunicare esclusività e artigianalità, ma spesso trascurano le fondamenta tecnologiche per proteggere i dati dei clienti.

Lin Yue ha inoltre sottolineato come la fuga di dati possa causare gravi danni sia per i consumatori, esposti a frodi e molestie, sia per i marchi stessi, che rischiano un crollo della fiducia, procedimenti legali e danni reputazionali. Chen Jingjing ha osservato che per i brand di lusso, la sicurezza dei dati dovrebbe diventare parte integrante dell’esperienza premium offerta ai clienti, e andrebbe inserita come priorità nelle strategie aziendali a lungo termine.

Infine, come misure di tutela, Lin Yue ha consigliato ai consumatori di limitare la quantità di dati personali condivisi con i brand e di cambiare regolarmente le proprie password. Per le aziende, invece, ha suggerito di trattare i dati come asset intangibili fondamentali, adottare tecnologie di protezione più avanzate – come password dinamiche per i sistemi CRM e limitazioni dell’accesso fuori orario – per consolidare davvero la fiducia dei propri clienti.

L'articolo Fuga di dati Louis Vuitton: 420.000 clienti coinvolti a Hong Kong proviene da il blog della sicurezza informatica.



#Giappone tra crisi e #dazi


altrenotizie.org/primo-piano/1…


Vi spiego le Guerre Stellari di oggi e di domani. Parla il capo della Space Force Usa Saltzman

@Notizie dall'Italia e dal mondo

Nel 1983, durante la presidenza Reagan, venne proposta la Strategic defense initiative (Sdi), che prevedeva l’installazione di armamenti nello Spazio. L’iniziativa, all’epoca, venne etichettata con tono ironico “Guerre stellari”.



Attacchi a SharePoint: hacker collegati alla Cina sfruttano la falla ToolShell


@Informatica (Italy e non Italy 😁)
Investigatori federali che hanno riscontrato connessioni da server SharePoint compromessi negli Stati Uniti verso indirizzi IP in Cina già venerdì e sabato scorsi. Ecco le implicazioni geopolitiche e il moltiplicarsi degli attori malevoli



mi immagino il presidente francese... che neppure ricordava dove cazzo avesse messo quella valigetta atomica... che la ritrova alla fine, e allora lo prende un dubbio terribile. chiama lo stato maggiore dell'esercito e chiede: "ma ancora tutto funziona perfettamente vero?" e alla risposta del generalissimo: "si beh... c'è sollo da impostare degli obiettivi, ma si"... e quello... rassicurato... "bravi ragazzi"...


Difesa, così Trump sta mobilitando l’industria pesante americana

@Notizie dall'Italia e dal mondo

C’è fermento nella macchina produttiva americana. Dal suo ritorno nello Studio Ovale, Donald Trump ha avviato una campagna sistematica di rilancio dell’industria della difesa, la quale non punta unicamente a riportare gli States a una dimensione produttiva capace di sostenere un impegno



Bae Systems aggiornerà i Gulfstream G550 dell’Aeronautica militare. I dettagli

@Notizie dall'Italia e dal mondo

Bae Systems ha ottenuto un contratto da 12 milioni di dollari da L3Harris per supportare la trasformazione di due velivoli Gulfstream G550 dell’Aeronautica militare in avanzate piattaforme di attacco elettronico (Electronic Attack, EA). Una mossa che proietta l’Italia tra i pochi Stati



Il Genocidio dei Moriori

@Arte e Cultura

Il genocidio moriori è un evento dimenticato. I Moriori predicavano la non violenza e la risoluzione pacifica dei conflitti, ma questo non li aiutò quando i Maori invasero le isole Chatam, massacrandoli e schiavizzandoli quasiContinue reading
The post Il Genocidio dei Moriori appeared first on

Arte e Cultura reshared this.



Il Genocidio dei Moriori

@Arte e Cultura

Il genocidio moriori è un evento dimenticato. I Moriori predicavano la non violenza e la risoluzione pacifica dei conflitti, ma questo non li aiutò quando i Maori invasero le isole Chatam, massacrandoli e schiavizzandoli quasiContinue reading
The post Il Genocidio dei Moriori appeared first on

Arte e Cultura reshared this.



Stati Uniti, condanna per l’ex agente nel caso Breonna Taylor


@Notizie dall'Italia e dal mondo
Nonostante il Dipartimento di Giustizia avesse chiesto solo un giorno di carcere, il giudice ha condannato Brett Hankison a 33 mesi per aver violato i diritti civili durante il raid che costò la vita all'infermiera simbolo delle proteste antirazziste
L'articolo Stati Uniti, condanna per



Ecuador, la CONAIE destituisce Leonidas Iza


@Notizie dall'Italia e dal mondo
Dopo tre giorni di tensioni e manovre interne, il leader storico del movimento indigeno è stato sconfitto da Marlon Vargas, vicino alle posizioni del governo Noboa
L'articolo Ecuador, la CONAIE destituisce Leonidas Iza pagineesteri.it/2025/07/22/ame…



Il carisma o ce l’hai o non ce l’hai
freezonemagazine.com/rubriche/…
Il quindicenne Declan Patrick MacManus è nel soggiorno di casa davanti alla televisione che trasmette Happening for Lulu, lo show del sabato trasmesso in diretta dalla BBC1 prima del telegiornale di fine pomeriggio. Patrick dovrebbe studiare ma sta aspettando l’esibizione della Jimi Hendrix Experience. In scaletta ci sono due canzoni: Woodoo Child e Hey Joe […]
L'articolo Il carisma



La “città umanitaria”: Netanyahu, Gaza e la Nakba 2025


@Notizie dall'Italia e dal mondo
La proposta israeliana delinea un campo di concentramento in attesa della deportazione: una struttura chiusa, dalla quale si potrà uscire soltanto per lasciare per sempre Gaza.
L'articolo La “città pagineesteri.it/2025/07/22/med…



Slovenia: il parlamento cancella i referendum su Nato e spese militari


@Notizie dall'Italia e dal mondo
Non si terrà la consultazione popolare sull'aumento delle spese militari promosso in Slovenia dal partito di sinistra Levica, che ha diviso i partiti di governo e generato preoccupazione in ambito Nato
L'articolo Slovenia: il parlamento cancella i referendum su



Micke Bjorklof & Blue Strip – Outtakes + Micke & Lefty featuring Chef – Live On Air
freezonemagazine.com/articoli/…
Se si provasse ad avviare una sorta di gioco ad indovinello circa personaggi della musica, della cultura e dello sport finlandesi, probabilmente la memoria collettiva non sarebbe così pronta nella risposta. I più attenti appassionati di cinema direbbero (il grande, almeno per il sottoscritto)

in reply to Mro

@mro@poliverso.orgAvete notato?

Chi scrive sciocchezze qualunquiste, conformiste e con l'intento di polarizzare nascondendo la complessità delle opinioni altrui, tende ad attribuire a sé nomi altisonanti.

Per come chiamarli, lascerei alla libera fantasia del turpiloquio di chi legge.

@Mro


quale è il senso, quando acquisti una radio, di consegnarti in formato A2 lo schema elettrico completo, ma non i sorgenti del software? non pare evidente che manca qualcosa?


"They could fix this problem. One of their talented software engineers could stop this fraudulent practice in its tracks, if they had the will to do so."#News
#News


The NIH wrote that it has recently “observed instances of Principal Investigators submitting large numbers of applications, some of which may have been generated with AI tools."#AI #NIH


The NIH Is Capping Research Proposals Because It's Overwhelmed by AI Submissions


The National Institutes of Health claims it’s being strained by an onslaught of AI-generated research applications and is capping the number of proposals researchers can submit in a year.

In a new policy announcement on July 17, titled “Supporting Fairness and Originality in NIH Research Applications,” the NIH wrote that it has recently “observed instances of Principal Investigators submitting large numbers of applications, some of which may have been generated with AI tools,” and that this influx of submissions “may unfairly strain NIH’s application review process.”

“The percentage of applications from Principal Investigators submitting an average of more than six applications per year is relatively low; however, there is evidence that the use of AI tools has enabled Principal Investigators to submit more than 40 distinct applications in a single application submission round,” the NIH policy announcement says. “NIH will not consider applications that are either substantially developed by AI, or contain sections substantially developed by AI, to be original ideas of applicants. If the detection of AI is identified post award, NIH may refer the matter to the Office of Research Integrity to determine whether there is research misconduct while simultaneously taking enforcement actions including but not limited to disallowing costs, withholding future awards, wholly or in part suspending the grant, and possible termination.”

Starting on September 25, NIH will only accept six “new, renewal, resubmission, or revision applications” from individual principal investigators or program directors in a calendar year.

Earlier this year, 404 Media investigated AI used in published scientific papers by searching for the phrase “as of my last knowledge update” on Google Scholar, and found more than 100 results—indicating that at least some of the papers relied on ChatGPT, which updates its knowledge base periodically. And in February, a journal published a paper with several clearly AI-generated images, including one of a rat with a giant penis. In 2023, Nature reported that academic journals retracted 10,000 "sham papers," and the Wiley-owned Hindawi journals retracted over 8,000 fraudulent paper-mill articles. Wiley discontinued the 19 journals overseen by Hindawi. AI-generated submissions affect non-research publications, too: The science fiction and fantasy magazine Clarkesworld stopped accepting new submissions in 2023 because editors were overwhelmed by AI-generated stories.

According to an analysis published in the Journal of the American Medical Association, from February 28 to April 8, the Trump administration terminated $1.81 billion in NIH grants, in subjects including aging, cancer, child health, diabetes, mental health and neurological disorders, NBC reported.

Just before the submission limit announcement, on July 14, Nature reported that the NIH would “soon disinvite dozens of scientists who were about to take positions on advisory councils that make final decisions on grant applications for the agency,” and that staff members “have been instructed to nominate replacements who are aligned with the priorities of the administration of US President Donald Trump—and have been warned that political appointees might still override their suggestions and hand-pick alternative reviewers.”

The NIH Office of Science Policy did not immediately respond to a request for comment.


#ai #nih


cari "amici" israeliani... che la guerra sia colpa di hamas non ci crede più nessuno... perché da quegli iniziali ostaggi israeliani voi nel frattempo ne avete uccisi mille volte tanti... e non erano terroristi e quindi beh... siete voi peggio dei hitler


#Cina: Canberra aggiusta il tiro?


altrenotizie.org/primo-piano/1…


I militari francesi abbandonano anche il Senegal


@Notizie dall'Italia e dal mondo
Dopo aver dovuto lasciare Mali, Ciad, Burkina Faso, Niger, Costa d'Avorio e Gabon, su richiesta di Dakar le truppe francesi hanno abbandonato anche il Senegal
L'articolo I militari francesi abbandonano anche il Senegal pagineesteri.it/2025/07/21/afr…




“Il tetto di 6 mesi per i licenziamenti è incostituzionale”. La Consulta dà ragione alla Cgil


“Il tetto di sei mesi per i licenziamenti è incostituzionale”. La Consulta dá ragione alla Cgil. Per la Corte “il criterio fisso non garantisce adeguatezza e congruità del risarcimento”. La sua cancellazione faceva parte dei quesiti al referendum


Nonostante il menefreghismo dei lavoratori Italiani il sindacato è riuscito lo stesso a far sparire una norma ingiusta.

Peccato che ne beneficieranno anche quelli a cui non importa nulla dei loro diritti. Gente che magari si convincerà anche che in fondo hanno fatto bene a starsene a casa tanto poi il risultato lo raggiunge qualcuno altro per loro.

cgiltoscana.it/2025/07/21/il-t…

reshared this

in reply to Max - Poliverso 🇪🇺🇮🇹

quando leggi commenti del tipo "le leggi si fanno in parlamento non con i referendum" oppure "i sindacati sono contro i lavoratori soprattutto Landini" capisci quanto ignorante è l'Italiano medio



In tests involving the Prisoner's Dilemma, researchers found that Google’s Gemini is “strategically ruthless,” while OpenAI is collaborative to a “catastrophic” degree.

In tests involving the Prisonerx27;s Dilemma, researchers found that Google’s Gemini is “strategically ruthless,” while OpenAI is collaborative to a “catastrophic” degree.#llms #OpenAI



Infostealer data can include passwords, email and billing addresses, and the embarrassing websites you use. Farnsworth Intelligence is selling to to divorce lawyers and other industries.#News #OSINT


A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors


When your laptop is infected with infostealing malware, it’s not just hackers that might get your passwords, billing and email addresses, and a list of sites or services you’ve created accounts on, potentially including some embarrassing ones. A private intelligence company run by a young founder is now taking that hacked data from what it says are more than 50 million computers, and reselling it for profit to a wide range of different industries, including debt collectors; couples in divorce proceedings; and even companies looking to poach their rivals’ customers. Essentially, the company is presenting itself as a legitimate, legal business, but is selling the same sort of data that was previously typically sold by anonymous criminals on shady forums or underground channels.

Multiple experts 404 Media spoke to called the practice deeply unethical, and in some cases the use of that data probably illegal. The company is also selling access to a subset of the data to anyone for as little as $50, and 404 Media used it to uncover unsuspecting victims’ addresses.

The activities of the company, called Farnsworth Intelligence, show a dramatic shift in the bevvy of companies that collect and sell access to so-called open source intelligence, or OSINT. Historically, OSINT has included things like public social media profiles or flight data. Now, companies increasingly see data extracted from peoples’ personal or corporate machines and then posted online as fair game not just to use in their own investigations, but to repackage and sell too.

“To put it plainly this company is profiting off of selling stolen data, re-victimizing people who have already had their personal devices compromised and their data stolen,” Cooper Quintin, senior public interest technologist at the Electronic Frontier Foundation (EFF), told 404 Media. “This data will likely be used to further harm people by police using it for surveillance without a warrant, stalkers using it to gather information on their targets, high level scams, and other damaging motives.”

💡
Do you know anything else about people selling data to debt collectors or these other industries? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

Infostealers are pieces of malware, often stealthily bundled in a piece of pirated software, that steal a victim’s cookies, login credentials, and often more information stored in their browser too. On its website, Farnsworth lays out several potential uses for that stolen data. This includes “skip tacing,” presumably a typo of skip tracing, which is where a private individual or company tracks someone down who owes a debt. The website says users can “find debtors up-to-date addresses.” Another use case is to “Find high impact evidence that can make/break the case of million dollar lawsuits, high value divorce cases, etc.” A third is to “generate lead lists of customers/users from competitors [sic] companies,” because the data could show which competing products they have login credentials for, and, presumably, use.

Calli Schroeder, senior counsel at the Electronic Privacy Information Center (EPIC), told 404 Media that the use cases Farnsworth offers are “not only morally questionable [...] but may not be legal or usable in some cases.” For the litigation one, courts are split on using stolen information as evidence in legal proceedings. When hackers targeted the dating site Ashley Madison, for example, a judge ruled that despite the data being publicly published it was still confidential and stolen and couldn’t be used. Most judges will not allow illegally obtained evidence in divorce proceedings either, Schroeder said.

Then for using the data to build a list of customers of competitors, Schroeder said that “may very well fall under corporate espionage and trade secrets violations, depending on what information is taken.”

“This is so gross and predatory. They are facilitating and enabling further exploitation of victims of a crime and bragging about how multiple criminal acts make their business better. Moral bankruptcy is common in this industry, but I rarely see a company so proud of it,” Schroeder added.
playlist.megaphone.fm?p=TBIEA2…
Farnsworth did not respond to multiple requests for comment. Aidan Raney, the company’s 23 year-old founder, did not respond to multiple Signal messages sent to an account he has previously used to communicate with 404 Media.

Farnsworth offers two infostealer related products. The first is Farnsworth’s “Infostealer Data Platform,” which lists those above use cases. This can display hacking victims’ full text passwords, and requires potential users to contact Farnsworth for access. The company asks applicants to explain their use case, and can include “private investigations, intelligence, journalism, law enforcement, cyber security, compliance, IP/brand protection,” and several others, according to its website.

The second product is infostealers.info, a publicly available service that requires no due diligence to enter. It only asks for a minimum of $50 to search through the results. These don’t include victims’ full passwords, but the platform still includes a wide range of sensitive information. Recently infostealers.info introduced the ability to search for data stored in a hacking victim’s autofill. That is, data stored in the browser for convenience that can automatically populate when filling out a form, such as a billing address. Using this tool, 404 Media was able to extract multiple peoples’ billing addresses. One was in Staten Island, New York, which appeared to be someone’s private residence. Another address was in India.

Inside the Massive Crime Industry That is Hacking Billion Dollar Companies
When you download that piece of pirated software, you might be also getting a piece of infostealer malware, and entering a highly complex hacking ecosystem that is fueling some of the biggest breaches on the planet.
404 MediaJoseph Cox


In other words, these people had been hacked, and now anyone with $50 was able to search through data stolen from their computer.

“This should also be an example of how once your data is lost in a breach you can't control what will happen to it. It can be used by law enforcement, stalkers, scammers, advertisers, or anyone with access to it. It's a stark reminder of why digital security is important even if you think you have nothing to hide,” Quintin from the EFF added.

Hackers running infostealer operations often create Telegram channels where they upload personal data their malware has stolen. Other criminals can then pay to access this stolen data. The administrator of one prolific infostealer campaign previously told 404 Media “this brings us good income, but I am not ready to disclose specific amounts.” Infostealers operators often then publish stolen credentials on Telegram for free, likely as a way to advertise their paid offerings. Farnsworth did not respond when asked if it is buying this stolen data from hackers to then put into its product.

Cybersecurity researchers have used infostealer data to unmask criminals. Hudson Rock, another company that sells infostealer-related services, used it to uncover information on two alleged fraudsters on the FBI’s Most Wanted List. Last year cybersecurity firm RecordedFuture said it found 3,334 unique credentials used to access child abuse imagery websites. It says it used that data to identify two individuals. In a LinkedIn post on Tuesday, Raney said the company has explored its own dataset in a similar way.

But those are different use cases to selling infostealer data on the open market or for potentially illegal use cases.

Quintin said “It would be illegal and unethical to sell stolen cell phones even if you didn't steal them yourself, and I don't see how this is any different.”