Salta al contenuto principale



The vast majority of mice that received the vaccine warded off repeated exposure to cancer cells, but the applications for humans are still not known.#vaccine #science #TheAbstract


A New 'Nanoparticle Vaccine' Prevented Cancer In Mice, Study Says


Scientists have developed a unique nanoparticle vaccine that prevented the development of multiple forms of cancer in mice, reports a study published in Cell Reports Medicine on Thursday.

Eighty percent of mice that received the novel vaccine and were subsequently exposed to cancerous cells did not develop tumors and survived to the end of the 250-day long experiment. In contrast, all of the mice that received different vaccine formulations, or remained unvaccinated, developed tumors and none survived longer than 35 days.

It’s too early to know if this breakthrough will ever be applicable to human cancer prevention or treatment, but the successful demonstration in mice is a promising result for the team’s so-called “super-adjuvant” vaccine. This approach uses nanoparticles made of fatty molecules to deliver two distinct “adjuvants,” which are substances in vaccines that enhance an immune response.

“The results that we have are super exciting, and we're really looking forward to pushing forward to the next steps,” said Griffin Kane, a postdoctoral research associate at the University of Massachusetts Amherst and first author on the paper, in a call with 404 Media. “But I think that the translation of these types of therapies from preclinical mouse models to the clinic is a very humbling experience for a lot of people and teams.”

“It’s these highlights that make it worth coming to work,” added Prabhani Atukorale, assistant professor of biomedical engineering in the Riccio College of Engineering at UMass Amherst and corresponding author on the paper, in the same call. “But I agree that the translation of these findings is key. We are not satisfied with simply publishing a paper. We want to get these into patients, and it is a humbling process because there are significant gaps.”
playlist.megaphone.fm?p=TBIEA2…
Scientists have been working on nanoparticle-based drug designs for decades, and the field has experienced rapid progress in recent years alongside advances in nanotechnology and drug delivery pathways. Nanoparticles provide a stable platform for carrying vaccine components to key targets, increasing the efficiency of delivery to specific sites in the body and uptake by the immune system.

Atukorale’s team previously published a study on a similar vaccine that shrank and cleared tumors from mice. In their new study, the researchers adapted the nanoparticle design to achieve prophylactic protection from melanoma, pancreatic, and triple-negative breast cancer in mice, with support from the Institute for Applied Life Sciences at UMass Amherst, UMass Chan Medical School, and the National Institutes of Health.

Vaccines consist of two main components: antigens, which are substances that trigger an immune response, and adjuvants, which enhance the immune response. Like other cancer vaccines, the nanoparticle treatment delivers antigens that activate white blood cells in the immune system to help fight off specific types of tumors.

What’s new in this study is that the nanoparticles accommodated two distinct adjuvants that target different immune pathways known as STING (stimulator of interferon genes) and TLR4 (Toll-like receptor 4), which further boosts the immune response to introduced cancer cells.

Adjuvants often require very different drug delivery systems, but the nanoparticles, which are about 30 to 60 nanometers across, are big enough to house different adjuvants in their unique environments, while remaining small enough to enter lymph nodes where they can activate key immune cells.

“The big picture is that we need better adjuvants for our vaccines,” Atukorale said. “We think that we can build them using nanoparticles. This is an example in a tumor.”

One of the most exciting surprises from the study turned out to be the prolonged protection against the spread of cancer provided by the nanoparticle vaccine. The vaccinated mice that did not develop tumors during their first exposure to melanoma cells were then later injected with new metastatic cancer cells, and their immune systems fought those off too, preventing the development and spread of the tumors.

“There's long-term robust memory immunity,” said Kane.

Moreover, while the team focused on certain cancers in their experiment, the nanoparticle platform could deliver a range of specialized antigen-adjuvant combinations to target different types of tumors.

“We think that this is one of the true strengths of these strategies,” said Atukorale. “They will have much broader reach than many of the cancer-specific treatments out there.”

That said, Kane and Atukorale cautioned that their team’s work is still in early stages—and, of course, focused on mice and not people. They also noted that only a handful of cancer vaccines have been clinically approved out of thousands in development. While the new study represents an intriguing step forward, the dream of wide-ranging prophylactic cancer vaccines is many years away, assuming it can materialize at all.

“A lot of very elegant technologies have come out of labs and have not fully succeeded in patients,” Kane said. “We believe that we're building this technology towards something that would improve on what current cancer vaccines are able to deliver.”


Science Channel reshared this.



Tv2000 trasmetterà in diretta da piazza San Pietro due appuntamenti del weekend con Papa Leone XIV: sabato 11 ottobre alle 18 la veglia di preghiera e il rosario per la pace (in streaming anche su Play2000) e domenica 12 ottobre alle 10.


404 Media has gotten a grant to unearth public records about systematic censorship of books, schools, and libraries in the U.S.#Updates


Help Us Investigate Book Bans and Educational Censorship Around America


Over the last few years, some of our more meaningful (and unfortunately bleakest) reporting has been on the many ways in which the right wing has systematically targeted libraries, schools, authors, and educators over the things they teach, specifically with regard to the teaching of systemic racism, LGBTQ+ issues, science, and sex education. These targeting efforts have led to a widespread, highly successful effort to ban books, restrict curricula, harass and oust teachers and librarians, and broadly censor the educational system. This movement has leveraged these successes to seize power not just in city councils and local school boards but has succeeded in making censorship and “anti wokeness” one of the dominant political ideologies in the United States.

We have successfully gained access to public records that show, for example, how a local group in Idaho successfully got a police officer to go hunting for “obscene” books at the public library, the playbook behind getting "Drag Storytime" library events canceled, how superintendents in Florida couldn’t figure out how to comply with the state’s “Don’t Say Gay” law, and have spoken to numerous librarians, scientists, and professors to learn how educational freedom, free access to information, and historic archives are under attack. Today—which happens to be the fourth day of Banned Books Week—we are proud and excited to announce that we will be continuing and ramping up this work over the next year with the help of a grant from our friends and colleagues at government transparency nonprofit Muckrock, with support from the Filecoin Foundation for the Decentralized Web. (We’re also excited to partner with Muckrock on this new piece of limited edition merch it made for Banned Books week).

From our proposal: “Book banning and educational censorship (the banning of LGBTQIA+ studies, the study of slavery and systemic racism, the war on “DEI” and trans people) has become a political cudgel and core rallying point for the current administration. These bans have been pushed through by organized groups such as Moms for Liberty and high-profile politicians, and impact the daily lives, careers, and future prospects of students, their families, and teachers, while simultaneously managing to become a core part of the culture war. These documents about censorship are themselves difficult to obtain and are at risk of being memory holed and forgotten about without a systematic effort to obtain, publish, and archive them. This project will show how censorship works and will shed light on the sheer scale of these censorship efforts, at a time when public trust in the government is at an all-time low.”

Over the next few weeks, we will be filing hundreds of public records requests with state, local, and federal governments and school districts with the hope of unearthing more information about the groups, politicians, and monied interests that have been pushing book bans and educational censorship on American public schools and libraries. As we get these documents back over the course of the next few months, we will be making them available to the public through Document Cloud, with the hopes of creating an enduring archive of public records about educational censorship in the United States. We will also, of course, be reporting on the documents we get back and will be turning them into articles that you can read on 404 Media.

As always, we will need some help from our readers. We need help deciding what to look for, which school districts and cities to seek public records from, and need leads on where we should point our reporting efforts. During the height of the pandemic, many city councils made their meeting minutes and meeting transcripts searchable, so we have a good sense of the types of organizations and communities that have been most severely affected by educational censorship and book bans, and have a good idea of where to get started. But if you are a librarian, teacher, educator, parent, local politician, or activist who is aware of systemic efforts to ban books, censor curricula, defund libraries, or otherwise attack educational freedom, please let us know by emailing jason@[url=https://web.brid.gy/404media.co]404 Media[/url] or by reaching out to Jason securely over Signal at jason.404. And if you want to further support this work, you can do so by becoming a paid subscriber or by donating to our tip jar.




Dazn, lettera agli utenti pirata per il risarcimento: “Pagate 500 euro e non rifatelo”

[quote]MILANO – Cinquecento euro e la promessa di “non porre in essere, in futuro, ulteriori comportamenti che ledano i diritti” della società. Sono queste le richieste avanzate da Dazn agli…
L'articolo Dazn, lettera agli utenti pirata per il risarcimento: “Pagate 500 euro



Maranello, i dettagli della prima Ferrari interamente elettrica. Vigna: “Data storica”

[quote]Elkann: "Investiti 6,5 miliardi dal debutto in borsa. Oggi è un'azienda ancora più forte"
L'articolo Maranello, i dettagli della prima Ferrari interamente lumsanews.it/maranello-i-detta…



L’Esg cambia volto. Nasce la finanza europea della difesa

@Notizie dall'Italia e dal mondo

L’Europa accelera sulla costruzione di una finanza a misura di difesa e sicurezza, e lo fa aggiornando le proprie regole del gioco. Euronext, il principale mercato borsistico paneuropeo che riunisce le piazze di Parigi, Milano, Amsterdam, Bruxelles, Lisbona e Dublino, avvia una nuova stagione per



1000 POS di negozi USA e UK violati e messi all’asta: “accesso totale” a 55.000 dollari


Un nuovo annuncio pubblicato su un forum underground è stato rilevato poco fa dai ricercatori del laboratorio di intelligence sulle minacce di Dark Lab e mostra chiaramente quanto sia ancora attivo e pericoloso il mercato nero degli accessi a sistemi informatici sensibili.

L’utente “nixploiter”, con un profilo già consolidato nella community underground (livello “gigabyte“, con oltre 150 post), ha recentemente messo in vendita l’accesso a più di 1000 macchine POS (Point of Sale) situate tra USA e Regno Unito.

Disclaimer: Questo rapporto include screenshot e/o testo tratti da fonti pubblicamente accessibili. Le informazioni fornite hanno esclusivamente finalità di intelligence sulle minacce e di sensibilizzazione sui rischi di cybersecurity. Red Hot Cyber condanna qualsiasi accesso non autorizzato, diffusione impropria o utilizzo illecito di tali dati. Al momento, non è possibile verificare in modo indipendente l’autenticità delle informazioni riportate, poiché l’organizzazione coinvolta non ha ancora rilasciato un comunicato ufficiale sul proprio sito web. Di conseguenza, questo articolo deve essere considerato esclusivamente a scopo informativo e di intelligence.

Nel post, l’attore malevolo afferma di avere accesso tramite pannelli di amministrazione RMM (Remote Monitoring and Management), che garantirebbero pieni privilegi amministrativi, controllo remoto e persino shell con accesso root. Le macchine compromesse opererebbero su sistemi Windows 7, 8, 10 e 11, utilizzando software molto conosciuto e diffuso nel settore retail.

L’offerta, impostata come un’asta, parte da 8.000 dollari, con incrementi di 5.000 e un prezzo “blitz” immediato di 55.000 dollari. Il venditore stabilisce inoltre una finestra di 48 ore dopo l’ultima offerta per concludere la transazione, richiedendo una piccola cauzione in Bitcoin per confermare l’affidabilità dell’acquirente.

Implicazioni e rischi


Un accesso di questo tipo rappresenta una seria minaccia diretta non solo per i negozi coinvolti, ma anche per i clienti e i circuiti finanziari collegati.

I sistemi POS gestiscono dati estremamente sensibili – transazioni, carte di pagamento, credenziali e log di rete – che possono essere sfruttati per:

  • Rubare informazioni finanziarie e clonare carte di credito.
  • Installare malware o ransomware all’interno dei terminali.
  • Manipolare transazioni o alterare flussi di pagamento.
  • Sfruttare i dispositivi come pivot per muoversi lateralmente nelle reti aziendali più ampie.

Il riferimento all’uso di un software RMM, è comune nelle infrastrutture aziendali legittime, suggerisce che gli attaccanti abbiano sfruttato strumenti di gestione remota non protetti o mal configurati – una tecnica in forte crescita nel panorama delle minacce.

Considerazioni finali


Questo episodio mette in luce ancora una volta l’importanza della sicurezza dei dispositivi POS, spesso trascurata rispetto ad altri sistemi IT.

È fondamentale che le aziende:

  • Implementino autenticazioni forti e segmentazione di rete.
  • Aggiornino regolarmente i software RMM e POS.
  • Monitorino gli accessi remoti e i log di sistema per individuare comportamenti anomali.
  • Limitino l’esposizione di pannelli di gestione su Internet.

La vendita di accessi a oltre mille terminali POS non è solo un’operazione criminale isolata: è un indicatore di vulnerabilità sistemica che riguarda direttamente la sicurezza del commercio digitale globale.

L'articolo 1000 POS di negozi USA e UK violati e messi all’asta: “accesso totale” a 55.000 dollari proviene da il blog della sicurezza informatica.







Meshtastic: A Tale of Two Cities


If I’m honest with myself, I don’t really need access to an off-grid, fault-tolerant, mesh network like Meshtastic. The weather here in New Jersey isn’t quite so dynamic that there’s any great chance the local infrastructure will be knocked offline, and while I do value my privacy as much as any other self-respecting hacker, there’s nothing in my chats that’s sensitive enough that it needs to be done off the Internet.

But damn it, do I want it. The idea that everyday citizens of all walks of life are organizing and building out their own communications network with DIY hardware and open source software is incredibly exciting to me. It’s like the best parts of a cyberpunk novel, without all the cybernetic implants, pollution, and over-reaching megacorps. Well, we’ve got those last two, but you know what I mean.
Meshtastic maps are never exhaustive, but this gives an idea of node density in Philly versus surrounding area.
Even though I found the Meshtastic concept appealing, my seemingly infinite backlog of projects kept me from getting involved until relatively recently. It wasn’t until I got my hands on the Hacker Pager that my passing interest turned into a full blown obsession. But it’s perhaps not for the reason you might think. Traveling around to different East Coast events with the device in my bag, it would happily chirp away when within range of Philadelphia or New York, but then fall silent again once I got home. While I’d get the occasional notification of a nearby node, my area had nothing like the robust and active mesh networks found in those cities.

Well, they say you should be the change you want to see in the world, so I decided to do something about it. Obviously I wouldn’t be able to build up an entire network by myself, but I figured that if I started standing up some nodes, others might notice and follow suit. It was around this time that Seeed Studio introduced the SenseCAP Solar node, which looked like a good way to get started. So I bought two of them with the idea of putting one on my house and the other on my parent’s place down the shore.

The results weren’t quite what I expected, but it’s certainly been an interesting experience so far, and today I’m even more eager to build up the mesh than I was in the beginning.

Starting on Easy Mode


I didn’t make a conscious decision to start my experiment at my parent’s house. Indeed, located some 60 miles (96 km) from where I live, any progress in building out a mesh network over there wouldn’t benefit me back home. But it was the beginning of summer, they have a pool, and my daughters love to swim. As such, we spent nearly every weekend there which gave me plenty of time to tinker.

For those unfamiliar with New Jersey’s Southern Shore area, the coastline itself is dotted with vacation spots such as Wildwood, Atlantic City, and Long Beach Island. This is where the tourists go to enjoy the beaches, boardwalks, cotton candy, and expensive rental homes. But move slightly inland, and you’ll find a marshland permeated with a vast network of bays, creeks, and tributaries. For each body of water large enough to get a boat through, you’ll find a small town or even an unincorporated community that in the early 1900s would have been bustling with oyster houses and hunting shacks, but today might only be notable for having their own Wawa.
To infinity, and beyond.
My parents are in one of those towns that doesn’t have a Wawa. Its very quiet, the skies are dark, and there’s not much more than marsh and water all around. So when I ran the SenseCAP Solar up their 20 foot (6 m) flagpole, which in a former life was actually the mast from a sailing catamaran, the results were extremely impressive.

I hadn’t had the radio up for more than a few hours before my phone pinged with a message. We chatted back and forth a bit, and I found that my new mesh friend was an amateur radio operator living on Long Beach Island, and that he too had just recently started experimenting with Meshtastic. He was also, incidentally, a fan of Hackaday. (Hi, Leon!) He mentioned that his setup was no more advanced than an ESP32 dev board sitting in his window, and yet we were reliably communicating at a range of approximately 6 miles (9 km).

Encouraged, I decided to leave the radio online all night. In the morning, I was shocked to find it had picked up more than a dozen new nodes. Incredibly, it was even able to sniff out a few nodes that I recognized from Philadelphia, 50 miles (80 km) to the west. I started to wonder if it was possible that I might actually be able to reach my own home, potentially establishing a link clear across the state.

Later that day, somebody on an airplane fired off a few messages on the way out of Philadelphia International Airport. Seeing the messages was exciting enough, but through the magic of mesh networking, it allowed my node to temporarily see networks at an even greater distance. I picked up one node that was more than 100 miles (160 km) away in Aberdeen, Maryland.

I was exhilarated by these results, and eager to get back home and install the second SenseCAP Solar node installed. If these were the kind of results I was getting in the middle of nowhere, surely I’d make even more contacts in a dense urban area.

Reality Comes Crashing Home


You see, at this point I had convinced myself that the reason I wasn’t getting any results back at home was the relatively meager antenna built into the Hacker Pager. Now that I had a proper node with an antenna bigger than my pinkie finger, I was sure I’d get better results. Especially since I’d be placing the radio even higher this time — with a military surplus fiberglass mast clamped into the old TV antenna mount on my three story house, the node would be around 40 feet (12 m) above the ground.
The mast gets my node above the neighbor’s roofs, but just barely.
But when I opened the Meshtastic app the day after getting my home node installed, I was greeted with….nothing. Not a single node was detected in a 24 hour period. This seemed very odd given my experience down the shore, but I brushed it off. After all, Meshtastic nodes only occasionally announce their presence when they aren’t actively transmitting.

Undaunted, I made plans with a nearby friend to install a node at his place. His home is just 1.2 miles (1.9 km) from mine, and given the 6 mile (9 km) contact I had made down the shore, it seemed like this would be an easy first leg of our fledgling network.

Yet when we stood up a temporary node in his front yard, messages between it and my house were only occasionally making it through. Worse, the signal strength displayed in the application was abysmal. It was clear that, even at such a short range, an intermediary node would be necessary to get our homes reliably connected.

At this point, I was feeling pretty dejected. The incredible results I got when using Meshtastic in the sticks had clearly given me a false sense of what the technology was capable of in an urban environment. To make matters even worse, some further investigation found that my house was about the worst possible place to try and mount a node.

For one thing, until I bothered to look it up, I never realized my house was located in a small valley. According to online line-of-sight tools, I’m essentially at the bottom of a bowl. As if that wasn’t bad enough, I noted that the Meshtastic application was showing an inordinate number of bad packets. After consulting with those more experienced with the project, I now know this to be an indicator of a noisy RF environment. Which may also explain the exceptionally poor reception I get when trying to fly my FPV drone around the neighborhood, but that’s a story for another day.

A More Pragmatic Approach


While I was disappointed that I couldn’t replicate my seaside Meshtastic successes at home, I’m not discouraged. I’ve learned a great deal about the technology, especially its limitations. Besides, the solution is simple enough — we need more nodes, and so the campaign to get nearby friends and family interested in the project has begun. We’ve already found another person in a geographically strategic position who’s willing to host a node on their roof, and as I write this a third Seeed SenseCAP Solar sits ready for installation.

At the same time, the performance of Meshtastic in a more rural setting has inspired me to push further in that region. I’m in the process of designing a custom node specifically tailored for the harsh marine environment, and have identified several potential locations where I can deploy them in the Spring. With just a handful of well-placed nodes, I believe it should be possible to cover literally hundreds of square miles.

I’m now fighting a battle on two fronts, but thankfully, I’m not alone. In the months since I’ve started this project, I’ve noticed a steady uptick in the number of detected nodes. Even here at home, I’ve finally started to pick up some chatter from nearby nodes. There’s no denying it, the mesh is growing everyday.

My advice to anyone looking to get into Meshtastic is simple. Whether you’re in the boonies, or stuck in the middle of a metropolis, pick up some compatible hardware, mount it as high as you can manage, and wait. It might not happen overnight, but eventually your device is going to ping with that first message — and that’s when the real obsession starts.


hackaday.com/2025/10/09/meshta…



ho delle fantasie assurde... a volte mi diverto a immaginare una meloni, o un salvini, a una "convention" con un buon numero di persone che la pensano più o meno come me... con lui che fa la sua sparata contro gli immigrati... contro i vaccini... o difende putin o israele... della serie perché la malvagia nato... e non viene immediatamente insultato... ma un gelo sensibile e glaciale prende improvvisamente possesso della folla... poi continua a dire le sue cose e la gente semplicemente si gira e se ne va in massa, con una sola risposta: "no grazie".


‘We don’t want democracy lol. We want caliphate.’ According to court records, an Oklahoma guardsman with a security clearance gave 3D printed firearms to an FBI agent posing as an Al Qaeda contact.#News


National Guardsman Planned American Caliphate on Discord, Sent 3D Printed Guns to Al Qaeda, Feds Say


The FBI accused a former National Guardsman living in Tulsa, Oklahoma of trying to sell 3D printed guns to Al Qaeda. According to an indictment unsealed by the Justice Department in September, 25-year-old Andrew Scott Hastings used a Discord server to plan a Caliphate in America and shipped more than 100 3D printed machine gun conversion kits to an undercover FBI operative who claimed he had contacts in the terrorist organization.
playlist.megaphone.fm?p=TBIEA2…
The Army Times first reported the story after the DOJ unsealed the charging documents. According to the court records, Hastings first landed on the radar of authorities in 2019 when a co-worker at an Abuelo’s restaurant in Tulsa called the police to report he’d been talking about blowing things up. When the cops interviewed Hastings, he told them he was just interested in chemistry and The Anarchist’s Cookbook. In 2020, the cops interviewed his mom. “Hastings’ mother, Terri, told TPD that her son was on the [autism] spectrum, was socially active online, and had converted to Islam.”

According to Terri, odd incidents piled up. She said that someone mailed Hastings a Quran, that he’d once received an order of chicken wings paid for by someone in Indonesia, and that he’d once threatened his family with a can of gasoline. “She also mentioned an incident in the family home where Hastings became enraged when she cooked bacon, and thereafter called someone she described as his ‘handler,’” according to court records.

The charging documents said the FBI got involved in 2024 because of a Discord server called “ARMY OF MUHAMMAD.” Discord cooperated with the FBI investigation and granted access to some of Hastings’ records to authorities. The FBI alleged that Hastings met with several other people on the Discord server and plotted terror attacks against Americans. At this time, Hastings worked for the National Guard as an aircraft powertrain repairer and held a SECRET-level national security clearance.

The charging documents detailed Hastings' alleged plot to establish a caliphate in the US via Discord. “[T]he most important theater right now is cyberspace…we need an actionable plan we can start work on--something slow and Ling(sic) term not hasty and slapdash,” Hastings allegedly said on Discord. “I think it would be best if we create a channel and I’ll list a physical training routine.”

“If we get 9-10 guys maybe inshaAllah we can …we could put headquarters in the USA cuz yk [you know] if we are fighting them the military is prohibited from operations on the homeland only ntnal [sic] guard and agencies can operate within borders…[y]ou need to contest air land and cyberspace…what my plan addresses is how to contest all of these at once while providing more aid than harm we can do in collateral and taking out targets of higher strength.”

According to the FBI’s version of events, Hastings talked about moving the group off of Discord and onto Signal because he believed Discord wasn’t secure. He also bragged about police interrogating him about explosives and “claimed to have made a firearm and discussed making a nuclear rocket.”

“We don’t want democracy lol,” he said on Discord, according to court records. “We want caliphate”

Hastings talked about other groups he was in contact with on Signal, offered to make training videos about weapon handling, and told others on the Discord server that he knew how to make firearms and was willing to ship them to like-minded militants. “I already have some small arms components partially finished and nearly ready to issue,” he said, according to the charging document. “I’ll send one photo but wanna remain kinda anonymous.”

The FBI said it slipped an “Online Covert Employee” (OCE) into Hastings’ life on March 26, 2025. Posing as a person on eBay, the FBI employee told Hastings he had contacts with Al Qaeda. “The OCE then recommended they move the conversation to Telegram or Signal, the latter of which Hastings said did not even have ‘a backdoor,’ meaning it could not be hacked or intercepted by law enforcement.”

The issue, of course, is that Hastings was speaking with an FBI employee. Over the next few months, Hastings spoke with the OCE about using a 3D printer to manufacture weapons for them with the eventual goal of getting them in the hands of Al Qaeda. Hastings allegedly told the OCE that he’d been discharged from the military and needed to make money.

In the summer of 2025, the FBI alleged that Hastings started mass printing Glock parts and switch conversion kits for Al Qaeda. “Hastings told the OCE he was moving out of his parent’s home in July 2025 after they complained about the noise and smell created when he 3D printed weapons,” the court documents said. The FBI allegedly has video of Hastings at a post office shipping multiple packages that summer that authorities said contained more than 100 3D printed switches, two 3D printed lower receivers for a Glock, and one 3D printed Glock slide.

The FBI has charged Hastings with attempting to provide material support or resources to designated foreign terrorist organizations and illegal possession or transfer of a machinegun. The Justice Department considers every single 3D conversion kit Hastings shipped an individual machinegun, even when they’re not installed.


#News

Breaking News Channel reshared this.



Vulnerabilità critica nel tema WordPress Service Finder: aggiornare subito alla versione 6.1


Una vulnerabilità critica ha interessato il popolare tema WordPress Service Finder, consentendo agli aggressori di accedere a qualsiasi account del sito web, inclusi quelli amministrativi, senza autorizzazione.

Il problema ha interessato il plugin integrato Service Finder Bookings, utilizzato per le prenotazioni e incluso nel tema. La vulnerabilità aggira il meccanismo di autenticazione, consentendo agli aggressori di assumere il controllo del sito web e abusarne delle funzionalità.

Alla vulnerabilità è stato assegnato l’identificatore CVE-2025-5947 e ha un punteggio CVSS critico di 9,8. Il bug è stato causato da un errore nella funzione service_finder_switch_back(), responsabile del passaggio da un account all’altro. Il plugin ha convalidato in modo errato il valore del cookie, consentendo a un aggressore di accedere come qualsiasi utente senza richiedere l’autenticazione. Ciò ha portato a un’escalation di privilegi, dall’accesso non autorizzato al controllo completo del sito web.

Secondo Envato Market, il tema Service Finder ha guadagnato popolarità, con oltre 6.100 clienti che lo utilizzano. Tutte le versioni fino alla 6.0 inclusa erano vulnerabili. Gli sviluppatori hanno risolto il problema il 17 luglio 2025 con l’aggiornamento 6.1, che ha rivisto le funzionalità e rafforzato il meccanismo di verifica.

Dall’inizio di agosto, sono stati registrati oltre 13.000 tentativi di sfruttare questa vulnerabilità. La percentuale esatta di attacchi riusciti non è ancora stata resa nota, ma è già noto che sono stati presi di mira siti web che utilizzavano il componente vulnerabile Service Finder Bookings. I ricercatori di Wordfence hanno identificato diversi indirizzi IP utilizzati per tentare di aggirare la protezione, tra cui 5.189.221[.]98, 185.109.21[.]157, 192.121.16[.]196, 194.68.32[.]71 e 178.125.204[.]198.

Le potenziali conseguenze per i siti web compromessi possono essere gravi. Gli aggressori possono iniettare script dannosi, reindirizzare i visitatori a pagine di phishing, utilizzare la piattaforma per distribuire malware o creare servizi falsi.

Poiché gli attacchi sono possibili anche senza alcuna registrazione preventiva, i siti restano vulnerabili finché gli amministratori non installano l’ultima versione del tema e non verificano eventuali modifiche sospette nella configurazione e nel contenuto.

Gli esperti di sicurezza raccomandano vivamente ai proprietari di siti web che utilizzano il tema Service Finder di aggiornare il prima possibile alla versione 6.1 e di analizzare i registri delle attività per identificare potenziali tentativi di accesso non autorizzati. In caso di sfruttamento attivo della vulnerabilità, eventuali ritardi potrebbero avere gravi conseguenze per l’infrastruttura e la reputazione delle risorse.

L'articolo Vulnerabilità critica nel tema WordPress Service Finder: aggiornare subito alla versione 6.1 proviene da il blog della sicurezza informatica.



PALESTINA. Il piano Trump è un progetto di dominio travestito da soluzione politica


@Notizie dall'Italia e dal mondo
Intervista all'analista giordana Shahd Hammouri sul piano Trump. "Per il diritto internazionale un accordo raggiunto sotto coercizione è nullo. E il diritto dei palestinesi all’autodeterminazione è inalienabile, non è negoziabile"



Forte questa cosa... 😁

@Fisica


Qual è il modo più semplice per passare da miglia a chilometri?

Usa Fibonacci!

1, 2, 3, 5, 8, 13, 21, 34, ...

2 miglia sono circa 3 chilometri
3 miglia sono circa 5 chilometri
...
21 miglia sono circa 34 chilometri

e più la distanza diventa lunga, più l'approssimazione è corretta.

Perché la serie di Fibonacci tende al rapporto aureo 1.618 che è molto vicino al rapporto 1 miglio = 1.609 chilometri

#sapevatelo


reshared this



mi ricorda vagamente qualcosa... è pieno di gente che pensa che basti togliere libertà per risolvere i problemi. in realtà è più complesso di così. servirebbe partecipazione ai problemi. ma per qualche motivo per la gente il politico non è quella figura che fa una sintesi tra istanze che arrivano dal basso, privilegiando quello o quell'altro a seconda della parte politica, ma quello che RISOLVE I PROBLEMI. mai idea fu più sbagliata. i problemi li risolve la gente con il lavoro e le scelte di tutti i giorni, o chi avvia un'attività sana e utile. perché una classe politica che non può ovviamente da sola risolvere i problemi al massimo può cercare di convincerti con la propaganda di averli risolti: non ha altri strumenti effettivi. oppure si creano nuovi problemi a tavolino, e questi magari si possono davvero risolvere, visto che non sono neppure veri problemi. facile inventarsi i problemi e risolvere quelli. sia il problema che la soluzione sono nell'idea di chi convince qualcun altri prima che esistono, e poi che sono spariti, grazie a qualche intervento ad-kazzzum se non criminale, oppure dichiarandoli pubblicamente risolti. esistono soluzioni a corto e lungo termine, e soluzioni sostenibili e soluzioni NON sostenibili.


Domani volevo andare a Milano, in treno, faccio una ricerca sul sito di Trenitalia e vedo che:

1) con un Interregionale ci metterei 5 ore e 8 minuti (velocita media circa 60 km/h) e pagherei 25,50 €;
2) con un Intercity ci metterei 6 ore e 32 minuti (velocita media circa 50 km/h) e pagherei 36,50 €.

(per completezza aggiungo che ci sono anche le Frecce, velocissime e costosissime)

Domande:
a) come fa un Intercity ad essere più lento di un Interregionale (considerando anche che con l'Interregionale dovrei fare due cambi e con l'intercity no)?
b) come fa un Intercity, che è più lento di un Interregionale, a costare di più?
b) come fanno dei treni a muoversi con velocità medie così basse?

E niente, vado in auto...

reshared this

in reply to .mau.

@.mau.

Interessante.

Ti danno un servizio peggiore però il prezzo del biglietto resta quello...

in reply to .mau.

@.mau.

È vero... anche perché ci passi così tanto tempo su quell'Intercity che potrebbero farti pagare la tassa di soggiorno.



Jack Hardy – Southern Comfort – Live Trio 1988 -Teatro dell’Acquario Cosenza
freezonemagazine.com/articoli/…
Ci sono dischi che non raccontano solo una serata, ma una geografia dello spirito. Southern Comfort, registrato dal vivo nel 1988 al Teatro dell’Acquario di Cosenza, è uno di quei documenti che restituiscono non soltanto la voce di un artista, ma il respiro di un’epoca e di un modo di intendere la canzone


ACN e la sovranità digitale al DisclAImer Tour del Corsera


Mi ha fatto anche molto piacere conoscere di persona il procuratore Gratteri, persona dai modi squisiti. E poi l’intervento di Bruno Frattasi, il direttore generale di Agenzia per la Cybersicurezza Nazionale, senza rete, è stato spettacolare, spaziando dal ransomware all’hashtag#IA, dalle regole europee ai temi più decisamente industriali e alla sovranità tecnologica.

Luna gli ha anche fatto una domanda non semplice sul rapporto tra Italia e Israele e Frattasi ha potuto confermare che non è assolutamente vero che qualcuno abbia consegnato a Israele le chiavi delle nostra cybersecurity (e come potrebbe, visto che è un ecosistema?) mentre è ovvio che l’Italia ha sempre avuto rapporti politici e industriali col paese mediorientale.

Una cosa non mi ha convinto molto, nelle parole di qualche panelist, e cioè questa idea che l’Italia è arretrata e deve “comprare innovazione” e “computer moderni” per garantirsi la sovranità digitale. Intanto l’innovazione, secondo me, non si compra ma si fa, e noi, Italia, pur con difficoltà, la facciamo; secondo, non è la dotazione dell’impiegato che fa la differenza in termini di protezione cibernetica, se non come uno dei tanti fattori coinvolti. Sono più importanti i servizi e la loro corretta configurazione, qualità e performance che la fanno. E poi la sicurezza è un concetto multifattoriale, dove comunque il fattore umano – awareness, formazione e cultura – è quello che fa la differenza, infatti “i dilettanti hackerano i computer, i professionisti hackerano le persone”, dice Schneier.

Quindi sicuramente possiamo aumentare gli investimenti in tecnologia, e creare una forza lavoro sufficiente e qualificata, ma dobbiamo investire molto in upskilling e reskilling nel mondo cyber.

E poi ci sono le regole: sono quelle italiane ed europee che ci hanno consentito di fare politiche di sicurezza anche senza avere dei campioni tecnologici nazionali nel campo del software e dell’hardaware, del cloud e dell’Intelligenza Artificale. La sovranità digitale ormai non può che essere Europea.

Vabbè il discorso è lungo, lo continueremo nei prossimi giorni.
Intanto complimenti a Luna, Frattasi e Gratteri, ma anche a Giorgio Ventre a Vito Di Marco, e a tutti i relatori presenti. é stata una bella occasione


dicorinto.it/formazione/acn-e-…



Google Japan Turn Out Another Keyboard, and it’s a Dial


There’s a joke that does the rounds, about a teenager being given a dial phone and being unable to make head nor tail of it. Whether or not it’s true, we’re guessing that the same teen might be just a stumped by this year’s keyboard oddity from Google Japan. It replaces keys with a series of dials that work in the same way as the telephone dial of old. Could you dial your way through typing?

All the files to make the board, as well as a build guide, are in the GitHub repository linked above, but they’ve also released a promotional video that we’ve put below the break. The dials use 3D printed parts, and a rotary encoder to detect the key in question. We remember from back in the day how there were speed dialing techniques with dial phones, something we’ve probably by now lost the muscle memory for.

We like this board for its quirkiness, and while it might become a little tedious to type a Hackaday piece on it, there might be some entertainment for old-timers in watching the youngsters figuring it out. If you’re hungry for more, we’ve covered them before.

youtube.com/embed/BgdWyD0cBx4?…

Thanks [ikeji] for the tip.


hackaday.com/2025/10/09/google…



@Firenze

Qualcuno sa dove si possono noleggiare bici a Firenze per un sabato o una domenica?

Bici "vere" non elettriche.

reshared this

in reply to Max - Poliverso 🇪🇺🇮🇹

Trek in manifattura tabacchi noleggia belle bici altrimenti anche decathlon propone un servizio simile, come spesso fanno alcune officine di riparazioni bici.

Firenze reshared this.



buona notizia. qualcuno che pensa esiste.


la russia è sempre stata un bel guaio ed è sempre stata sul suolo europeo. solo i comunisti old style hanno usato tutte le energie per essere solo antiamericani. non dimentichiamo che l'italia è stata il paese con il partito comunista più forte. e questo è un problema culturale serio. che non si risolve però diventando fascisti. che poi è il gioco di putin. il modello illiberale di putin, corea del nord, cina, alla fine, al netto delle bolle speculative (immobiliare cinese di ieri e auto elettrica di oggi) non produce reddito e sviluppo alla lunga.


Silvana Dragutinović con Enzo Martines – Donne che pensano di notte
freezonemagazine.com/news/silv…
In libreria dal 15 Ottobre 2025 Un lavoro scritto a quattro mani: protagonista e scrittore, in uno scambio emotivo e letterario ricco e profondo. La storia vera di una donna impegnata a fare della sua durissima esperienza il proprio lavoro: aiutare altre donne che subiscono violenze e prevaricazioni. Una testimonianza sul



In memoria di David Calabrò. Per la sicurezza stradale


@Giornalismo e disordine informativo
articolo21.org/2025/10/in-memo…
Sono trascorsi due anni da quell’11 ottobre 2023 quando David Calabrò, di soli 46 anni, mentre passeggiava in bicicletta sulla strada Cisterna-Nettuno è stato travolto e ucciso da una macchina che, dopo



FREEDOM FLOTILLA: Incarcerati a Keziot anche gli altri attivisti e volontari


@Notizie dall'Italia e dal mondo
Le navi sono state rimorchiate fino al porto di Ashdod, dove i passeggeri sono stati sottoposti a procedure di identificazione e interrogatori
L'articolo FREEDOM FLOTILLA: Incarcerati a Keziot anche gli altri attivisti e volontari proviene da Pagine



Editori Indipendenti – Intervista a: Miraggi Edizioni
freezonemagazine.com/articoli/…
Dopo aver intervistato Mattioli 1885, Astarte edizioni e Prehistorica Edizioni, Free Zone Magazine continua la serie di interviste a Editori Indipendenti perché riteniamo che il loro ruolo nel campo dell’editoria sia da sempre di vitale importanza. Ciò per il lavoro di accurata ricerca, da loro svolto, nell’individuazione di autori e libri di


GAZA. Trump: accordo fatto tra Israele e Hamas. La firma oggi in Egitto


@Notizie dall'Italia e dal mondo
Entro lunedì Hamas libererà tutti gli ostaggi israeliani ancora vivi, poi scatterà la tregua e saranno scarcerati 2000 prigionieri politici palestinesi. Trump sarà in Medio oriente nei prossimi giorni
L'articolo GAZA. Trump: accordo fatto tra Israele e Hamas. La



Eyes Up's purpose is to "preserve evidence until it can be used in court." But it has been swept up in Apple's crackdown on ICE-spotting apps.

Eyes Upx27;s purpose is to "preserve evidence until it can be used in court." But it has been swept up in Applex27;s crackdown on ICE-spotting apps.#News


Apple Banned an App That Simply Archived Videos of ICE Abuses


Apple removed an app for preserving TikToks, Instagram reels, news reports, and videos documenting abuses by ICE, 404 Media has learned. The app, called Eyes Up, differs from other banned apps such as ICEBlock which were designed to report sightings of ICE officials in real-time to warn local communities. Eyes Up, meanwhile, was more of an aggregation service pooling together information to preserve evidence in case the material is needed in the future in court.

The news shows that Apple and Google’s crackdown on ICE-spotting apps, which started after pressure from the Department of Justice against Apple, is broader in scope than apps that report sightings of ICE officials. It has also impacted at least one app that was more about creating a historical record of ICE’s activity during its mass deportation effort.

“Our goal is government accountability, we aren’t even doing real-time tracking,” the administrator of Eyes Up, who said their name was Mark, told 404 Media. Mark asked 404 Media to only use his first name to protect him from retaliation. “I think the [Trump] admin is just embarrassed by how many incriminating videos we have.”

💡
Do you work at Apple or Google and know anything else about these app removals? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

Mark said the app was removed on October 3. At the time of writing, the Apple App Store says “This app is currently not available in your country or region” when trying to download Eyes Up.

The website for Eyes Up which functions essentially the same way is still available. The site includes a map with dots that visitors can click on, which then plays a video from that location. Users are able to submit their own videos for inclusion. Mark said he manually reviews every video before it is uploaded to the service, to check its content and its location.

“I personally look at each submission to ensure that it's relevant, accurately described to the best I can tell, and appropriate to post. I actually look at the user submitted location and usually cross-reference with [Google] Street View to verify. We have an entire private app just for moderation of the submissions,” Mark said.



Screenshots of Eyes Up.

The videos available on Eyes Up are essentially the same you might see when scrolling through TikTok, Instagram, or X. They are a mix of professional media reports and user-generated clips of ICE arrests. Many of the videos are clearly just re-uploads of material taken from those social media apps, and still include TikTok or Instagram watermarks. Mark said the videos are also often taken from Reddit or the community- and crime-awareness app Citizen too.

Many of the videos from New York are footage of ICE officials aggressively detaining people inside the city’s courts, something ICE has been doing for months. Another is a video from the New York Immigration Coalition (NYIC), which represents more than 200 immigrant and refugee rights groups. Another is an Instagram video showing ICE taking “a mother as her child begs the officers not to take her,” according to a caption on the video. The map includes similar videos from San Diego, Los Angeles, and Portland, Oregon, which are clearly taken from TikTok or media reports, including NBC News.

“Our goal is to preserve evidence until it can be used in court, and we believe the mapping function will make it easier for litigants to find bystander footage in the future,” Mark said.

Aaron Reichlin-Melnick, senior fellow at the American Immigration Council, told 404 Media “Like any other government agency, DHS is required to follow the law. The collection of video evidence is a powerful tool of oversight to ensure that the government respects the rights of citizens and immigrants alike. People have a right to film interactions with law enforcement in public spaces and to share those videos with others.”

“If DHS is concerned that the actions of their own officers might inflame public opinion against the agency, they should work to increase oversight and accountability at the agency — rather than seek to have the evidence banned,” he added.

Apple removed ICEBlock, another much more prominent app, on Thursday from its App Store. The move came after direct pressure from Department of Justice officials acting at the direction of Attorney General Pam Bondi, according to Fox. A statement the Department of Justice provided to 404 Media said the agency reached out to Apple “demanding they remove the ICEBlock app from their App Store—and Apple did so.” Fox says authorities have claimed that Joshua Jahn, the suspected shooter of an ICE facility in September in which a detainee was killed, searched his phone for various tracking apps before attacking the facility.

Joshua Aaron, the developer of ICEBlock, told 404 Media “we are determined to fight this.”

ICEBlock allowed people to create an alert, based on their location, about ICE officials in their area. This then sent an alert to other users nearby.

Apple also removed another similar app called Red Dot, 404 Media reported. Google did the same thing, and described ICE officials as a vulnerable group. Apple also removed an app called DeICER.
playlist.megaphone.fm?p=TBIEA2…
Yet, Eyes Up differs from those apps in that it does not function as a real-time location reporting app.

Apple did not respond to a request for comment on Wednesday about Eyes Up’s removal.

Mark provided 404 Media with screenshots of the emails he received from Apple. In the emails, Apple says Eyes Up violates the company’s guidelines around objectionable content. That can include “Defamatory, discriminatory, or mean-spirited content, including references or commentary about religion, race, sexual orientation, gender, national/ethnic origin, or other targeted groups, particularly if the app is likely to humiliate, intimidate, or harm a targeted individual or group. Professional political satirists and humorists are generally exempt from this requirement.”

The emails also say that law enforcement have provided Apple with information that shows the purpose of the app is “to provide location information about law enforcement officers that can be used to harm such officers individually or as a group.”

The emails are essentially identical to those sent to the developer of ICEBlock which 404 Media previously reported on.

In an appeal to the app removal, Mark told Apple “the posts on this app are significantly delayed and subject to manual review, meaning the officers will be long gone from the location by the time the content is posted to be viewed by the public. This would make it impossible for our app to be used to harm such officers individually or as a group.”

“The sole purpose of Eyes Up is to document and preserve evidence of abuses of power by law enforcement, which is an important function of a free society and constitutionally protected,” Mark’s response adds.

Apple then replied and said the ban remains in place, according to another email Mark shared.

The app is available on Google's Play Store.

Update: this piece has been updated to include comment from Aaron Reichlin-Melnick.


#News #x27

Breaking News Channel reshared this.



Manifestazione a Torino del 3 ottobre 2025 riprese, musica e regia a cura di Free Assange Italia youtu.be/RjD6Tn0vcIE?si=XY76Ab…

Gazzetta del Cadavere reshared this.



Independent journalists must be protected from ICE attacks


FOR IMMEDIATE RELEASE:

Press freedom advocates were pleasantly surprised when police in Broadview, Illinois, announced plans to investigate federal immigration officers’ shooting of a local CBS News journalist with pepper balls, and when the Illinois State Police offered help.

But the same advocates were alarmed by subsequent reports of local police assisting federal agents rather than reining them in. They also questioned why widely reported attacks on independent journalists — who have made up a significant majority of those victimized by federal officers while covering the protests — were not being similarly investigated.

Freedom of the Press Foundation (FPF) led a letter demanding answers today, signed by over 20 local and national press freedom and civil liberties groups that came together to demand protection and justice for independent journalists risking their safety to inform the public.

“ICE’s violent attacks on journalists and others exercising their First Amendment rights, in Broadview and nationwide, should all be thoroughly investigated by the local authorities whose states and municipalities ICE has invaded. Any local law enforcement presence should be solely focused on mitigating the harm ICE is causing to our neighborhoods, our free press, and our Constitution, not on enabling more of it,” said Seth Stern, director of advocacy at FPF.

“The violence and unlawful detainment of members of the press should concern us all. As demonstrations escalate, it’s imperative that authorities allow journalists to do their jobs of documenting what we are seeing on the ground. No one should have their First Amendment rights violated, especially journalists,” said Brandon Pope, president of NABJ-Chicago.

“The Chicago Journalists Association stands with journalists everywhere who are working to keep their communities informed,” the CJA board of directors said. “They should be free to exercise their First Amendment right to freedom of the press without intimidation, whether they’re fully employed by a news organization or practicing independently.”

You can read the letter here or below.

Please contact us if you would like further comment.

freedom.press/static/pdf.js/we…


freedom.press/issues/independe…

Gazzetta del Cadavere reshared this.



mobilizon.it/events/da30cbda-0…

#torino #stand-up comedy #corsoparigi #collettivo190

reshared this



#Ucraina, il bluff dei Tomahawk


altrenotizie.org/primo-piano/1…



OpenAI’s Sora 2 platform started just one week ago as an AI-generated copyright infringement free-for-all. Now, people say they’re struggling to generate anything without being hit with a violation error.#OpenAI #Sora #Sora2


People Are Crashing Out Over Sora 2’s New Guardrails


Sora, OpenAI’s new social media platform for its Sora 2 image generation model, launched eight days ago. In the first days of the app, users did what they always do with a new tool in their hands: generate endless chaos, in this case images of Spongebob Squarepants in a Nazi uniform and OpenAI CEO Sam Altman shoplifting or throwing Pikachus on the grill.

In little over a week, Sora 2 and OpenAI have caught a lot of heat from journalists like ourselves stress-testing the app, but also, it seems, from rightsholders themselves. Now, Sora 2 refuses to generate all sorts of prompts, including characters that are in the public domain like Steamboat Willie and Winnie the Pooh. “This content may violate our guardrails concerning similarity to third-party content,” the app said when I tried to generate Dracula hanging out in Paris, for example.

When Sora 2 launched, it had an opt-out policy for copyright holders, meaning owners of intellectual property like Nintendo or Disney or any of the many, many massive corporations that own copyrighted characters and designs being directly copied and published on the Sora platform would need to contact OpenAI with instances of infringement to get them removed. Days after launch, and after hundreds of iterations of him grilling Pokemon or saying “I hope Nintendo doesn’t sue us!” flooded his platform, Altman backtracked that choice in a blog post, writing that he’d been listening to “feedback” from rightsholders. “First, we will give rightsholders more granular control over generation of characters, similar to the opt-in model for likeness but with additional controls,” Altman wrote on Saturday.
An error that appears when I tried to use the prompt "Dracula hanging out in Paris." It says: “This content may violate our guardrails concerning similarity to third-party content."
But generating copyrighted characters was a huge part of what people wanted to do on the app, and now that they can’t (and the guardrails are apparently so strict, they’re making it hard to get even non-copyrighted content generated), users are pissed. People started noticing the changes to guardrails on Saturday, immediately after Altman’s blog post. “Did they just change the content policy on Sora 2?” someone asked on the OpenAI subreddit. “Seems like everything now is violating the content policy.” Almost 300 people have replied in that thread so far to complain or crash out about the change. “It's flagging 90% of my requests now. Epic fail.. time to move on,” someone replied.

“Moral policing and leftist ideology are destroying America's AI industry. I've cancelled my OpenAI PLUS subscription,” another replied, implying that copyright law is leftist.

A ton of the videos on Sora right now are of Martin Luther King, Jr. either giving brainrot versions of his iconic “I have a dream” speech and protesting OpenAI’s Sora guardrails. “I have a dream that Sora AI should stop being so strict,” AI MLK says in one video. Another popular prompt is for Bob Ross, who, in most of the videos featuring the deceased artist, is shown protesting getting a copyright violation on his own canvas. If you scroll Sora for even a few seconds today, you will see videos that are primarily about the content moderation on the platform. Immediately after the app launched, many popular videos featured famous characters; now some of the most popular videos are about how people are pissed that they can no longer make videos with those characters.


0:00
/0:09



0:00
/0:09

OpenAI claimed it’s taken “measures” to block depictions of public features except those who consent to be used in the app. “Only you decide who can use your cameo, and you can revoke access at any time.” As Futurism noted earlier this week, Sora 2 has a dead celebrity problem, with “videos of Michael Jackson rapping, for instance, as well as Tupac Shakur hanging out in North Korea and John F. Kennedy rambling about Black Friday deals” all over the platform. Now, people are using public figures, in theory against the platform’s own terms of use, to protest the platform’s terms of use.

Oddly enough, a lot of memes for whining about the guardrails and content violations on Sora right now are using LEGO minifigs — the little LEGO people-shaped figures that are not only a huge part of the brand’s physical toy sets, but also a massively popular movie franchise owned by Universal Pictures — to voice their complaints.


0:00
/0:09

In June, Disney and Universal sued AI generator Midjourney, calling it a "bottomless pit of plagiarism" in the lawsuit, and Warner Bros. Discovery later joined the lawsuit. And in September, Disney, Warner Bros. and Universal sued Chinese image generator Hailuo AI for infringing on its copyright.


reshared this



Candidarsi e svignarsela. Il nuovo gioco di destra e sinistra: chi perde, fugge

@Politica interna, europea e internazionale

Enrico Michetti, Catello Maresca, Fabio Battistini: chi erano costoro? Occorre un notevole sforzo di memoria per ricordare il nome degli uomini che il centrodestra candidò alla carica di sindaco di Roma, di Napoli e di Bologna alle elezioni



#Sport a #scuola, è stato approvato all’unanimità in prima lettura alla Camera dei Deputati il disegno di legge che modifica la normativa sull’utilizzo degli impianti sportivi scolastici da parte di associazioni o società sportive.



Mass. Pirate News: What did Trump give to get his TikTok deal?


Steve and James discuss The Black Response’s excellent Abolition and Alternatives Conference this weekend and Trump’s TikTok deal and what it could mean. We also discussed ICE and other TLAs attacking an apartment building in Chicago in the middle of the night where they seized and abused the people who lived in it. Finally, we followed up on HorizonMass/BINJ’s reporting on the Boston Police Department’s use of drones at two public events. youtube.com/embed/I-w5-TZR6v4?… Join us at the Boston Anarchist Bookfair Nov. 1-2. Sign up to our newsletter to get notified of new events or volunteer. Join us on:


Check out:


Some links we mentioned:


Image Credit: Fair use of TikTok‘s logo for commentary on news about the company. We reserve no rights on the image we creat


uspirates.org/mass-pirate-news…



Vendo laptop HP Pavilion g6 - Questo è un post automatico da FediMercatino.it

Prezzo: 50 €

Vendo laptop HP Pavilion g6 come da specifiche seguenti. Consegna brevi manu in zona Pavia (PV) o Udine (UD).


  • Modello: HP Pavilion g6-1310el Notebook PC
  • Architettura: 64-bit
  • Processore: AMD E2-3000M APU @1.8GHz (2 CPUs) with Radeon HD Graphics
  • Memoria: 500 GB HDD SATA 5400rpm
  • RAM: 8 GB DDR3-SDRAM (2 x 4 GB, espansa rispetto ai 4 GB originali)
  • Scheda grafica (integrata): AMD Radeon HD 6380G (2 GB)
  • Display: 15.6", 1366 x 768, 60Hz, 16:9
  • Altoparlanti/Microfono: AMD High Definition Audio Device / IDT High Definition Audio CODEC
  • Webcam: HP Webcam-101


  • Anno di acquisto: 2009

  • Sistema operativo: Ufficio Zero Linux Minimal 5.1 64-bit (kernel Debian 6.1.0-40)
  • Software aggiuntivi: abiword (documenti), gnumeric (fogli di calcolo)

  • Batteria: sostituita a gennaio 2019. Durata con schermo attivo: 2 ore e 15
  • Stato: a livello software le funzionalità di base (ambiente desktop, connessione a internet, browser e motore di ricerca, gestione file, modifica documenti) girano perfettamente. A livello hardware: alcuni graffi sulla scocca posteriore e vicino alla tastiera; leggermente lasco ma funzionante il tasto sinistro della touchpad; un po' scolorita la lettera "A". Con intenso uso della memoria ventola un po' rumorosa. Check-up completo svolto a gennaio 2021
  • Prestazioni: avvio in 80s, primo avvio browser in 20s, apertura programma fogli di calcolo 15s
  • Note: inclusi alimentatore funzionante comprato a novembre 2024, fodera contenitiva e panno in microfibra per pulizia e separazione schermo/tastiera

🔗 Link su FediMercatino.it per rispondere all'annuncio

@Il Mercatino del Fediverso 💵♻️

lgsp reshared this.



Vendo laptop Sony VAIO - Questo è un post automatico da FediMercatino.it

Prezzo: 20 €

Vendo laptop Sony VAIO come da specifiche seguenti. Consegna brevi manu in zona Pavia (PV) o Udine (UD).


  • Modello: Sony VAIO VPCEB3J1E
  • Processore: Intel Core i3-370M @2.40GHz (2 CPUs)
  • Architettura: 64-bit
  • Memoria: 300 GB HDD SATA 5400rpm
  • RAM: 4 GB DDR3-SDRAM PC3-8500
  • Scheda grafica (integrata): Intel® HD Graphics 1751MB
  • Display: 15.5", 1366 x 768, 16:9
  • Altoparlanti/Microfono: Dolby Home Theater v3
  • Webcam: Motion Eye 640x480 0.3MP


  • Sistema operativo: Ufficio Zero Linux Minimal 5.1 64-bit (kernel Debian 6.1.0-40-686)
  • Software aggiuntivi: abiword (documenti), gnumeric (fogli di calcolo)

  • Batteria: durata con schermo attivo 45 minuti con rapido scaricamento al di sotto del 50% di batteria
  • Stato: a livello software le funzionalità di base (ambiente desktop, connessione a internet, browser e motore di ricerca, gestione file, modifica documenti) girano perfettamente. A livello hardware: ventola un po' rumorosa, qualche incrostazione nella parte inferiore della scocca a causa dell'applicazione in passato di piedini per il rialzo
  • Prestazioni: avvio in 100s, primo avvio browser in 30s, apertura programma fogli di calcolo 10s
  • Note: incluso alimentatore originale funzionante

🔗 Link su FediMercatino.it per rispondere all'annuncio

@Il Mercatino del Fediverso 💵♻️



Vendo laptop Toshiba SATELLITE PRO U500 - Questo è un post automatico da FediMercatino.it

Prezzo: 25 €

Vendo laptop Toshiba SATELLITE PRO U500 come da specifiche seguenti. Consegna brevi manu in zona Pavia (PV) o Udine (UD).


  • Modello: Toshiba SATELLITE PRO U500-1EQ (PSU83E-00Q00JMC)
  • Processore: Intel Core 2 Duo CPU P8700 @2.53GHz (2 CPUs)
  • Architettura: 64-bit
  • Memoria: 500 GB HDD
  • RAM: 4 GB DDR2-SDRAM
  • Scheda grafica (dedicata): Intel GMA 4500MHD
  • Display: 13.3", 1280 x 800, 60Hz
  • Altoparlanti/Microfono: High Definition Audio
  • Webcam: USB2.0 UVC WebCam


  • Anno di acquisto: 2009

  • Sistema operativo: Ufficio Zero Linux Minimal 5.1 64-bit (kernel Debian 6.1.0-40)
  • Software aggiuntivi: abiword (documenti), gnumeric (fogli di calcolo)

  • Batteria: durata con schermo attivo 2 ore e 30
  • Stato: a livello software le funzionalità di base (ambiente desktop, connessione a internet, browser e motore di ricerca, gestione file, modifica documenti) girano perfettamente. A livello hardware: non funziona la cassa sinistra; lasco ma funzionante il tasto sinistro della touchpad; ventola rumorosa
  • Prestazioni: avvio in 80s, primo avvio browser in 25s, apertura programma fogli di calcolo 10s
  • Note: inclusi alimentatore originale funzionante e borsa a tracolla per il trasporto

🔗 Link su FediMercatino.it per rispondere all'annuncio

@Il Mercatino del Fediverso 💵♻️



Assemblea dell’Onu dei Popoli. Dal 9 al 12 ottobre a Perugia


@Giornalismo e disordine informativo
articolo21.org/2025/10/assembl…
A 80 anni dalla fondazione dell’Onu A 10 anni dalla diffusione della Laudato sì di Papa Francesco A 800 anni dalla composizione del Cantico delle Creature di San Francesco Verso il 2030 per




Stacco da tutti i canali per un po'

Dovessi servire sono MYCEN4 sul telegram



Conflitto di interessi, dalla tragedia alla farsa


@Giornalismo e disordine informativo
articolo21.org/2025/10/conflit…
Al Senato si discute un incredibile disegno di legge (AS 1277) firmato dalla destra (Iannone, Cantalamessa, Gasparri, e così via) intitolato «Modifica alla legge 2 marzo 2023, n.22, in materia di conflitto di interesse



Vendo laptop Acer TravelMate 5730 - Questo è un post automatico da FediMercatino.it

Prezzo: 15 €

Vendo laptop Acer TravelMate 5730 come da specifiche seguenti. Consegna brevi manu in zona Pavia (PV) o Udine (UD).


  • Modello: Acer TravelMate 5730-6B4G25MN
  • Processore: Intel Core 2 Duo CPU T5870 @2.00GHz (2 CPUs)
  • Architettura: 64-bit
  • Memoria: 250 GB HDD SATA 5400rpm
  • RAM: 4 GB DDR2-SDRAM (2 x 2 GB)
  • Scheda grafica (dedicata): Intel GMA X4500HD
  • Display: 15.4", 1280 x 800, 60Hz, 16:10
  • Altoparlanti/Microfono: Realtek High Definition Audio
  • Webcam: Acer Crystal Eye webcam


  • Anno di acquisto: 2008

  • Sistema operativo: Ufficio Zero Linux Minimal 5.1 64-bit (kernel Debian 6.1.0-40)
  • Software aggiuntivi: abiword (documenti), gnumeric (fogli di calcolo)

  • Batteria: non tiene la carica, il computer può essere utilizzato solo con alimentazione. Su Amazon si trovano batterie per questo modello a 25 euro
  • Stato: a livello software le funzionalità di base (ambiente desktop, connessione a internet, browser e motore di ricerca, gestione file, modifica documenti) girano perfettamente. A livello hardware: batteria non funzionante; qualche macchia poco visibile sulla scocca posteriore; qualche graffio leggero vicino alla touchpad
  • Prestazioni: avvio in 90s, primo avvio browser in 20s, apertura programma fogli di calcolo 10/15s
  • Note: inclusi alimentatore originale funzionante, borsa a tracolla per il trasporto e panno in microfibra per pulizia e separazione schermo/tastiera

🔗 Link su FediMercatino.it per rispondere all'annuncio

@Il Mercatino del Fediverso 💵♻️

lgsp reshared this.