Salta al contenuto principale




L’Aeronautica Militare USA Sperimenta Droni da Combattimento con Intelligenza Artificiale


I piloti militari americani stanno padroneggiando una nuova disciplina : pilotare droni da combattimento controllati dall’intelligenza artificiale. Durante i voli di addestramento, i piloti dell’Aeronautica Militare statunitense si stanno esercitando a interagire con droni autonomi XQ-58 Valkyrie, in grado di prendere decisioni in una frazione di secondo e di cambiare istantaneamente traiettoria in risposta alle minacce. Lavorare a fianco di un partner del genere richiede che un pilota umano si adatti a una velocità di reazione precedentemente ritenuta impossibile.

La tecnologia che controlla il Valkyrie ha completato l’addestramento di base: gli algoritmi possono ora decollare, manovrare e coordinarsi autonomamente con i velivoli con equipaggio. Gli sviluppatori stanno attualmente addestrando il sistema in tecniche di combattimento difensive, come la schivata degli attacchi e l’intercettazione dei bersagli. All’interno dell’Aeronautica Militare, il progetto è stato ufficiosamente soprannominato “Top Gun AI”, un omaggio alla leggendaria scuola per piloti d’élite, ora dotata di compagni digitali.

L’XQ-58 Valkyrie è una piattaforma di volo da combattimento collaborativo (CCA). Si tratta di un drone stealth a reazione sviluppato da Kratos per il programma Low-Cost Attritable Strike Demonstrator. L’idea è quella di creare un velivolo relativamente economico ma altamente efficace, che possa essere schierato in massa accanto ai caccia. Il Valkyrie può volare a velocità fino a Mach 0,86 (circa 1.060 km/h), salire a un’altitudine di 13,7 km e percorrere 5.500 chilometri senza rifornimento. Il suo carico utile raggiunge i 2.700 chilogrammi, sufficienti per trasportare missili o equipaggiamento da ricognizione.

Questi velivoli sono attualmente in fase di test in formazione con i caccia F-35, F-22, F-15EX e F/A-18, e sono utilizzati anche dal Corpo dei Marines. Le linee di produzione di Kratos consentono il rapido assemblaggio di nuove unità, aprendo la strada alla creazione di interi squadroni di gregari senza pilota. I primi voli del programma di collaborazione uomo-macchina si stanno svolgendo presso la base aerea di Eaglin in Florida. Stanno testando come un pilota possa gestire una missione con partner autonomi e con quale affidabilità l’IA risponda a situazioni impreviste.

Il comandante dell’aeronautica militare statunitense, il generale Adrian Spain, ha confermato che i droni basati sull’intelligenza artificiale saranno utilizzati in uno spazio di battaglia unificato insieme ai caccia con equipaggio. Nell’estate del 2025, uno squadrone del 96° Test Wing ha condotto una serie di esercitazioni di addestramento , in cui i piloti hanno controllato i droni XQ-58A in combattimenti aerei simulati. I dati ottenuti contribuiranno ad adattare le tecnologie semi-autonome e a implementarle in unità reali.

Un altro programma, VENOM (Viper Experimentation and Next-generation Operations Model), è in corso contemporaneamente per aggiornare i caccia F-16 per il volo autonomo. I primi sei velivoli saranno dotati di nuove apparecchiature di bordo, software e un sistema di sensori che consentiranno il volo senza pilota. Tre di essi sono già in fase di aggiornamento, dopodiché inizieranno i test a terra e in volo. Per ora, la modalità autonoma viene attivata manualmente: un pilota collaudatore in cabina di pilotaggio potrà attivare e disattivare gli algoritmi in tempo reale, monitorandone il comportamento.

Durante i test, gli ingegneri valutano il modo in cui gli esseri umani gestiscono manovre brusche durante i voli congiunti e i limiti delle forze G sicure. Entro un anno e mezzo dall’arrivo del primo velivolo aggiornato, l’Aeronautica Militare prevede di avere un F-16 autonomo completamente operativo, pronto per test approfonditi.

I rappresentanti del comando sottolineano che eliminare completamente gli esseri umani dal processo decisionale non è ancora possibile: l’intelligenza artificiale non deve operare senza supervisione. Tuttavia, la possibilità di utilizzare jet da combattimento senza pilota per scortare gli equipaggi o intercettare gli avversari è vista come un vantaggio strategico. Queste macchine non si stancano, non sono soggette a panico e possono svolgere missioni in cui il rischio per gli esseri umani è troppo elevato.

L'articolo L’Aeronautica Militare USA Sperimenta Droni da Combattimento con Intelligenza Artificiale proviene da il blog della sicurezza informatica.



Entering the Wild World of Power Over Ethernet


As Ethernet became the world-wide standard for wired networking, there was one nagging problem. You already have to plug in the network cable. But then you have to also plug in a power cable. That power cable needs to be long enough. And have the right plug on it for your country. And provide the right current and voltage. That’s how Power over Ethernet (PoE) was born, first in a veritable Wild West of proprietary standards and passive injectors, then in a standardized process. Recently [T. K. Hareendran] wrote a primer on PoE, with more of a DIY intro focus, including some favorite PoE PD (powered device) chips to use in your own design.

You can still totally use passive PoE if that’s your jam, and you have full control over the network and any connected devices. This would allow you to, for example, power your SBCs for a couple of bucks, although for adding PoE to your Mac Mini you may want to look at some more refined options, if only as a safety precaution.

Much depends on the needs of each device, as PoE is meant mostly for low-power devices such as VoIP phones and the like. The more common IEEE 802.af and .at standards (Type 1 and 2) cap out at 30 Watts, with about 25 Watts available to the device after losses, while 802.3bt (Type 3 and 4) takes this up to 90 Watts, or just over 70 Watts after losses. Before making a decision, it would be good to read a detailed guide from someone with experience, like the one by [Alan] that we covered a while ago.


hackaday.com/2025/10/11/enteri…



Servizi RDP esposti nel mirino! Una botnet di 100.000 IP scandaglia la rete


Negli Stati Uniti, una vasta campagna coordinata tramite botnet sta prendendo di mira i servizi basati sul protocollo Remote Desktop Protocol (RDP).

Un pericolo notevole è rappresentato dalla scala e dalla struttura organizzativa di questa campagna, soprattutto per quelle organizzazioni che fanno affidamento su RDP per il loro funzionamento giornaliero.

L’azienda di sicurezza GreyNoise ha riferito di aver monitorato un’ondata significativa di attacchi provenienti da oltre 100.000 indirizzi IP univoci in più di 100 paesi.

L’operazione sembra essere controllata centralmente, con l’obiettivo primario di compromettere l’infrastruttura RDP, un componente fondamentale per il lavoro e l’amministrazione a distanza.

Questa scoperta ha dato il via a un’analisi più ampia, che ha rapidamente individuato picchi di attività simili in una moltitudine di paesi, tra cui Argentina, Iran, Cina, Messico, Russia e Sudafrica.

Nonostante le diverse origini geografiche, gli attacchi condividono un obiettivo comune: i servizi RDP negli Stati Uniti.

Gli analisti sono fortemente convinti che questa attività sia opera di un’unica botnet su larga scala. Questa conclusione è supportata dal fatto che quasi tutti gli IP partecipanti condividono un’impronta TCP simile. Questa firma tecnica suggerisce una struttura di comando e controllo standard e centralizzata che orchestra gli attacchi.

Il primo è un attacco di timing RD Web Access, un metodo in cui gli aggressori misurano il tempo di risposta del server ai tentativi di accesso per distinguere in modo anonimo i nomi utente validi da quelli non validi.

Gli autori della minaccia dietro questa campagna stanno utilizzando due vettori di attacco specifici per identificare e compromettere i sistemi vulnerabili.

Il secondo vettore è un’enumerazione degli accessi ai client web RDP, che tenta sistematicamente di indovinare le credenziali degli utenti. Questi metodi consentono alla botnet di scansionare e identificare in modo efficiente i punti di accesso RDP sfruttabili senza attivare immediatamente gli avvisi di sicurezza standard.

L’uso sincronizzato di questi metodi di attacco specifici e non banali su un numero così vasto di nodi indica ulteriormente un’operazione coordinata gestita da un singolo operatore o gruppo.

In risposta a questa minaccia persistente, GreyNoise ha pubblicato raccomandazioni specifiche per i responsabili della sicurezza della rete.

L’azienda consiglia alle organizzazioni di controllare proattivamente i propri registri di sicurezza per individuare eventuali sondaggi RDP insoliti o tentativi di accesso non riusciti che corrispondano agli schemi di questa campagna.

Per una protezione più diretta, GreyNoise ha creato un modello di blocklist dinamico, denominato “microsoft-rdp-botnet-oct-25”, disponibile tramite la sua piattaforma.

L'articolo Servizi RDP esposti nel mirino! Una botnet di 100.000 IP scandaglia la rete proviene da il blog della sicurezza informatica.



MAMbo è molto attivo nella costruzione e nel mantenimento di una fitta rete di relazioni con altri musei adrianomaini.altervista.org/ma…






“Metti via la spada”. Sono le parole rivolte da Gesù a Pietro nell’orto degli ulivi: Leone XIV le ha poste al centro della sua omelia, durante l’omelia della Veglia mariana con il Rosario per la pace pronunciata in piazza San Pietro.


“Dio regala gioia a chi produce amore nel mondo, gioia a quanti, alla vittoria sul nemico, preferiscono la pace con lui”. Ad assicurarlo è stato il Papa, commentando la frase contenuta nel angelo di Matteo: "Beati voi, operatori di pace”.


“I grandi del mondo si costruiscono imperi con il potere e il denaro”, ma “Dio non fa così: il Maestro non ha troni, ma si cinge un asciugamano e s’inginocchia ai piedi di ciascuno”.


“Metti via la spada”. Sono le parole rivolte da Gesù nell’orto degli ulivi, e il Papa le ha poste al centro della sua omelia, durante l’omelia della Veglia mariana con il Rosario per la pace pronunciata in piazza San Pietro, in occasione del Giubileo…


A Casio Toy Synth Is Ready To ROCK!


There is likely to be more than one of you who has eyed up a child’s toy synthesizer in a second hand store, and considered making something more impressive with it. In many cases these instruments are underwhelming, having a very small subset of functions based into their black-epoxy-blob microcontrollers.

[Make Something] found a Casio toy synth that has a few more functions than the average model, and with the addition of some extra effects electronics and a beautifully made case, turned it into an altogether more interesting instrument.

Most of the video has an element of workshop porn about it, as he makes a very nice Moog-style console case for it, a task made easier by an impressive array of CNC tools. The electronics are slightly more interesting, being a selection of cheap guitar pedals gutted and combined with a cheap tube preamp board. The result is a machine capable of some far more interesting sounds

We think many Hackaday readers would be able to repeat these functions from scratch without the pedals, and while the case is a thing of beauty it’s likely a decent job could be done with a little less finesse on more commonplace tools. Perhaps it’s worth giving those toy synths a second look, because they really can be had for pennies if you look hard enough. Perhaps it’s an easier option than a previous toy musical upgrade.

youtube.com/embed/X9-D6aOUSWY?…


hackaday.com/2025/10/11/a-casi…



se israele fosse una vera democrazia troverebbe imbarazzante spiegare ai palestinesi che tornano alle loro case e non le trovano, perché per combattere dei terroristi, con fini operazioni di intelligence (questo viene fatto se davvero sono terroristi), per quale motivo ha avuto necessità di applicare una così completa distruzione del territorio. ma siccome non è una vera democrazia, e questo si evince proprio dal fatto che pensa che tutti i palestinesi, anche i bambini di 1 giorno, sono dei terroristi (nonché ogni genere di giornalista di parte politica non allineata al governo israeliano), un po' come quando un famoso dittatore di 80 anni fa pensava che tutti gli ebrei fossero dannosi. alla fine il tempo passa, e persone diverse fanno comunque sempre le stesse cose, e costruiscono i cattivi per convenienza politica.


Tutti ad hackerare gli iPhone! Apple aumenta fino a 5 milioni di dollari la ricompensa su iOS


Apple ha ampliato significativamente il suo programma di ricompensa per le vulnerabilità per la sicurezza dell’ecosistema iOS. Alla conferenza Hexacon sulla sicurezza offensiva di Parigi, Ivan Krstic, vicepresidente dell’azienda per l’architettura e l’ingegneria della sicurezza, ha annunciato una ricompensa massima di 2 milioni di dollari per chi scoprirà una catena di vulnerabilità che potrebbe essere sfruttata a fini di spionaggio.

Se una tale combinazione permettesse al sistema di bypassare la funzionalità di sicurezza aggiuntiva “Modalità Blocco” o venisse scoperta in una versione beta del sistema, la ricompensa totale potrebbe raggiungere i 5 milioni di dollari. Le nuove regole entreranno in vigore il mese prossimo.

La decisione riflette la preoccupazione dell’azienda per il crescente mercato degli spyware commerciali e la sua volontà di impedirne lo sfruttamento nella fase di scoperta di vulnerabilità critiche. Apple sottolinea di attribuire particolare importanza alle scoperte che replicano la logica degli attacchi reali ed è disposta a pagare ingenti somme per tali investimenti di tempo e impegno.

Secondo Krstic, l’azienda ha già stanziato mezzo milione di dollari per singole scoperte e dal 2020, quando il programma è stato aperto a tutti, sono stati assegnati più di 35 milioni di dollari a oltre 800 ricercatori.

Oltre ad aumentare i premi, l’azienda ha ampliato l’elenco delle tipologie di vulnerabilità ammissibili al programma. Ora include attacchi one-click tramite l’infrastruttura del browser WebKit e metodi basati sull’utilizzo di canali radio in prossimità del dispositivo.

È stata inoltre aggiunta una nuova categoria, Target Flags, che integra essenzialmente elementi delle competizioni CTF nei test reali dei prodotti Apple. Ciò consente una dimostrazione rapida e chiara dell’efficacia degli exploit, aumentando la trasparenza del processo.

Oltre a creare incentivi per i cacciatori di vulnerabilità, Apple sta investendo nella sicurezza a lungo termine dei suoi prodotti a livello architetturale. A settembre, l’azienda ha introdotto Memory Integrity Enforcement, una funzionalità integrata nella serie iPhone 17. È progettata per bloccare la categoria di bug iOS più frequentemente sfruttata e mira principalmente a proteggere i gruppi vulnerabili, tra cui attivisti politici, giornalisti e difensori dei diritti umani.

Apple sottolinea che, anche se la maggior parte degli utenti non si imbatte mai in minacce spyware, proteggere i gruppi più vulnerabili rafforza la sicurezza dell’intero ecosistema. L’azienda lo spiega come un imperativo morale, soprattutto alla luce del persistente abuso di tali tecnologie, regolarmente segnalato sia dalle aziende IT che dalle organizzazioni per i diritti umani.

L'articolo Tutti ad hackerare gli iPhone! Apple aumenta fino a 5 milioni di dollari la ricompensa su iOS proviene da il blog della sicurezza informatica.





qualcuno si è chiesto come mai la popolazione israleiana è in crescita, da 50 anni, mentre quella palestinese è in decrescita? quale miracolosa politica demografia sia stata messa in atto per ridurre i terroristi e aumentare cittadini bravi, onesti, pacifici, e di destra? noto anche che considera una democrazia compiuta quella israeliana chi è di destra. li stessi che riconoscono numerosi meriti alla meloni peraltro.


Un East Shield a difesa dell’Europa. Reportage dal Fianco Orientale

@Notizie dall'Italia e dal mondo

Krynki è un piccolo villaggio della Polonia nord-orientale, a circa tre ore di auto da Varsavia. La strada per arrivarci attraversa la pianura polacca senza incontrare ostacoli naturali, fatta eccezione per la nebbia, a tratti fittissima, che da ottobre a marzo riduce la visibilità ad appena pochi metri e



Plus, when did claret get so good and why did Shackleton's ship Endurance sink? Historical updates aplenty.

Plus, when did claret get so good and why did Shackletonx27;s ship Endurance sink? Historical updates aplenty.#TheAbstract


Mole-Rats Could Hold the Key to Living Longer


Welcome back to the Abstract! These are the studies this week that lived long, played hard, crashed out, and topped it off with a glass of claret.

First off, it’s Naked Mole-Rat Week! Or at least it should be, given that there are multiple new studies about these rodents, which are neither moles nor rats, but are certifiably naked. Then: dogs on benders; ships on ice; and an aged wine with notes of oak, blackberry, and aggressive trade policy.

The age of Man is over; the time of the Mole-Rat has come


Yamakawa, Masanori et al. “Quantitative and systematic behavioral profiling reveals social complexity in eusocial naked mole-rats.” Science Advances.

Y. Chen et al. “A cGAS-mediated mechanism in naked mole-rats potentiates DNA repair and delays aging.” Science.

What a whirlwind week it’s been for the naked mole-rat beat, with studies that shed light into the complex social behavior of these burrowing rodents as well as their extreme longevity. Let’s make like a naked mole-rat and dig in!

Naked mole-rats didn’t get the memo about being a normal mammal and instead opted for a “eusocial” society similar to insects that is ruled by a colony queen with an entourage of breeder males, which are supported by a caste system of non-breeding workers. It’s super weird, but it seems to be working out for them because they can live to nearly 40 years old—ten times longer than most animals their size—and they are highly resistant to cancer and a host of other deathbringers.

Scientists took a closer look at the palace intrigue of these rodents by setting up several colonies in laboratory conditions and tracking their movements with microchips. The results revealed that queens are bossy bullies that get so tired from shoving their subjects around that they have to take frequent royal naps.
Different chambers in the experiment. Image: Yamakawa, Masanori et al.
Non-breeding workers, meanwhile, fell into six main “clusters” including cleaners, transport specialists, caretakers, diggers, and a group that just kind of idly loafs around (my spirit mole-rat cluster).

“Breeding females patrol burrows and display agonistic dominance toward nonbreeders paralleling queen aggression in primitively eusocial insects,” said Masanori Yamakawa of Kumamoto University. Meanwhile, non-breeding “cluster 1 individuals (high mobility and garbage occupancy) may serve as transport specialists, whereas those in cluster 4 (low mobility and frequent occupancy of nonfunctional chambers) may engage primarily in digging tasks. Cluster 5 individuals, who frequently occupied toilet chambers, may contribute to cleaning-related roles.”

In addition to this window into mole-rat social behavior, a new genetic analysis identified the critical role of an enzyme called cGAS, a common component in animal immune systems, in extending the lives of these subterranean super-agers.

Whereas cGAS may hinder DNA repair in most animals, including humans and mice, the naked mole-rat has evolved a version of the enzyme with four modified amino acids that enhances DNA repair . Naturally, the researchers also engineered some fruit flies with this naked mole rat enzyme—you gotta mess with fruit flies or it’s not science—and lo and behold, the juiced flies lived to about 70 days, roughly ten days longer than the control group.

“Our work provides a molecular basis for how DNA repair is activated to contribute to the exceptional longevity during evolution in naked mole-rats,” said researchers led by Yu Chen of Tongji University in Shanghai. “These findings support the notion that efficient DNA repair decelerates the aging process and raise the possibility that targeting cGAS to enhance DNA repair could provide an intervention strategy for promoting longevity.”

All those past adventurers were looking for the Fountain of Youth in the wrong places; it wasn’t in some beautiful tropical grove, but rather a stanky underground rodent pit.

In non-naked-mole-rat news…

Sit. Stay. Stage an intervention.


Mazzini, Alja et al “Addictive-like behavioural traits in pet dogs with extreme motivation for toy play.” Scientific Reports.

Dogs can literally get addicted to the game, according to a study that probed “‘excessive toy motivation” in domestic dogs as “a potential parallel to behavioral addictions in humans.” What this means in practice is that researchers enlisted 105 dogs to play with a lot of really fun toys and about a third of them got totally hooked.
youtube.com/embed/6hDndTOibQs?…
Thirty-three of the playful pooches “exhibited behaviors consistent with addictive-like tendencies including an excessive fixation on toys, reduced responsiveness to alternative stimuli, and persistent efforts to access toys,” said researchers led by Alja Mazzini of the University of Bern. “Dogs [are] the only non-human species so far that appears to develop addictive-like behaviours spontaneously without artificial induction.”
A bull terrier during tug-of-war play. Image: Alja Mazzini
While this an interesting scientific conclusion, the study is perhaps most notable for producing delightful footage of dogs in the midst of full-on toy benders. Like all of us who struggle with bad habits and fixations, these dogs will just have to take it one play at a time.

The enduring Endurance mystery


Tuhkuri, Jukka. Why did Endurance sink? Polar Record.

Endurance, the ship crushed by ice in 1915 during Ernest Shackleton's Antarctic expedition, was actually not all that endurant, according to Jukka Tukuri of Aalto University who concludes in a new study that “Shackleton was well aware of the risks related to the strength of Endurance, but chose to use it anyway.”

“This ship is not as strong as the Nimrod constructionally” wrote Shackleton of Endurance in a letter to his wife in 1914, comparing it to his previous Antarctic ride. “There is nothing to be scared of as I think she will go through ice all right only I would exchange her for the old Nimrod any day now except for comfort.”

You have to love the phrase “there is nothing to be scared of” in a letter from a guy on his way to the South Pole in a rickety ship that is definitely going to sink the following year. I’m sure Mrs. Shackleton was totally comforted by this! Tukuri provides many other fascinating diary entries to support his conclusion that “Endurance was not among the strongest ships of its time.”
The wreck of Endurance. Image: © Falklands Maritime Heritage Trust / National Geographic
That said, Endurance spent more than a century two miles under the Antarctic seas before the wreck was amazingly rediscovered and photographed in 2022. It’s still looking pretty good, even if Shackleton’s decision to set sail in it does not hold up as well.

A toast to the 17th century


Leary, Charlie. “Tasting 1660s Bordeaux claret: temporal transformation and wine economics.” Notes and Records: the Royal Society Journal of the History of Science.

To fight off that polar chill, let’s warm up for the (North American) long weekend with a really, really aged glass of wine. A new study upends the traditional narrative about the emergence of Bordeaux claret as a desired wine in the 1600s, suggesting it was not strictly developed in response to tariffs (Sike! I used wine to lure you into a disguised tariff story).

“The advent of a stronger, darker style of Bordeaux red wine, known as claret, in the English market has drawn substantial scholarly interest because it played a pivotal role in the balance of trade and international political economy during the eighteenth century,” said author Charlie Leary, a wine historian.

“Economic historians have posited that Bordeaux vignerons developed high-quality, high-priced claret in response to England’s fixed, volume-based tariffs on French wine,” he continued. “This article…shows that the new claret style pre-existed England’s tariff regime.”

With that, cheers to lost years and jeers to economic fears.

Thanks for reading! See you next week.




L’Unione dei Comitati contro l’inceneritore partecipa al “IX. International Applied Social Sciences Congress - C-iasoS 2025”


L’Unione dei Comitati contro l’inceneritore partecipa al “IX. International Applied Social Sciences Congress - C-iasoS 2025”, che si terrà presso l’Università di Roma “La Sapienza” dal 13 al 15 Ottobre 2025, illustrando un lavoro dal titolo “The Rome Waste Management Plan - Incinerator: A Wrong Choice”.

E’ una occasione importante per presentare, in un contesto internazionale qualificato, le considerazioni che facciamo da tempo nel denunciare la assurdità di questo Progetto – antistorico, antieconomico e pericoloso – e per confrontarci con esperti che certamente non affrontano il tema sulla base di pregiudizi ideologici o di interessi economici di lobby industriali; è un primo contributo ad un auspicabile dibattito sul piano di Roma e sul nuovo inceneritore, in assenza di un confronto mai accettato dal Sindaco di Roma.

La presentazione, fatta da Giuseppe Girardi, si terrà lunedì 13, nella sessione pomeridiana che inizia alle ore 14, presso la “Sala Lauree” della facoltà di Scienze Politiche, alla città universitaria, Piazzale Aldo Moro, 1.



Hack the Promise 2025 Conference Review


The HackThePromise Festival took place again from October 3–5, 2025 in the city of Basel, Switzerland. The theme this year was “Hacking Systems, Hacking Futures.” As usual, numerous Pirates were in attendance, including PPI´s alternate board member Schoresh Dawoodi who spoke at the event and took pictures for us.

The festival interprets “hacking” as not only about computers. It means breaking open systems, rethinking rules, and finding new ways to live and work together. HackThePromise mixes talks, art, films, workshops, technology, and social discussions.

Over three days, participants questioned ask how technology can serve freedom and community instead of control.

HackThePromise continues to grow as a meeting point for creative blending of technology and society. It is not only about tools but also about values. We look forward to participating in the future.


pp-international.net/2025/10/h…



il coordinamento impossibile


ottobre è letteralmente impazzito. non riesco a tener dietro al cumulo di incontri avvenuti, imminenti, in programma.
solo ieri, quattro o cinque - ma sicuramente di più - reading, mostre e presentazioni contemporanee tra Roma e fuori.
sono stato assente ovunque, preso da faccende extraletterarie.
ma anche avessi potuto dedicarmi a una cosa, quale avrei scelto?

anni fa si parlava di una specie di coordinamento cittadino per gli eventi, ovviamente mai realizzato.

reshared this



Il Dpp racconta la difesa che verrà. La spesa militare italiana letta da Mazziotti di Celso

@Notizie dall'Italia e dal mondo

Il ministero della Difesa ha reso pubblico il Documento Programmatico Pluriennale 2025-2027. Il documento viene pubblicato dopo la legge di bilancio, pertanto non aggiunge fondi ulteriori a quelli già stanziati per la difesa. Tuttavia, esso fornisce dettagli



PODCAST. Testimonianza da Gaza: in migliaia ritornano verso le case distrutte


@Notizie dall'Italia e dal mondo
"Dobbiamo cominciare a ricostruire. Ma dobbiamo ricostruire noi stessi prima, la nostra anima". Sami Abu Omar, cooperante di Gaza, ci racconta le prime ore del cessate il fuoco e la situazione nella Striscia di Gaza.
L'articolo PODCAST. Testimonianza da







There are famously two hard problems in computer science: cache invalidation, naming things, and off by one errors.

PS: Friendica status editor does not seem to have a language selector; hopefully this post-scriptum will give the oversmart algoritm some hints about it but I'm disappointed, given UX is not in the "hard problems" set 😁





GL-Como - Linux Day 2025


gl-como.it/v2015/linux-day-202…
Segnalato da Linux Italia e pubblicato sulla comunità Lemmy @GNU/Linux Italia
Anche quest'anno il GL-Como partecipa al Linux Day!
L'appuntamento annuale organizzato da ILS è nato nel 2001 per promuovere le idee del software libero e dell'open source, con un occhio di riguardo verso Linux. L'evento è

reshared this




Fight for press freedom as ICE attacks Chicago


Press freedom wins in Chicago court, but fight continues


Chicago journalists won a big First Amendment victory Oct. 9, when a federal court temporarily curbed federal officers’ abuses at protests. But the fight isn’t over.

The order still allows officers to potentially remove journalists along with protesters, a serious threat to press freedom that must be fixed.

We also can’t rely on courts alone. Local officials must step up, especially to protect independent journalists, who’ve been the main targets of these violations.

That’s why Freedom of the Press Foundation (FPF) led a coalition letter urging the Broadview, Illinois, Police Department and Illinois State Police to investigate attacks on independent journalists covering protests.

Read more about the order here.

Strengthen presidential library transparency


A segment on “Last Week Tonight with John Oliver” about corruption and secrecy surrounding presidential libraries cited FPF’s Lauren Harper, who has been warning about Trump’s purported library since before his inauguration.

Oliver is right. Secret donations to presidential libraries enable bribery, while public access to presidential records is at an all-time low. Use our action center tool to tell Congress to close the secrecy loopholes and increase transparency.

Write to your lawmakers here.

Army lawyer thinks journalists are stenographers


The Pentagon attempted to walk back its policy restricting reporters from publishing news the government doesn’t authorize. But the revised policy is still a nonstarter to which no journalist should agree.

Meanwhile, a nominee for general counsel for the Department of the Army, Charles L. Young III, effectively endorsed the unconstitutional restrictions during a Senate hearing this week, opining that the First Amendment authorizes the government to punish journalists for publishing information that it did not approve for public release.

That’s disqualifying. A journalist’s job isn’t to keep the government’s secrets. It’s to report news the government does not want reported.

Tell Congress to reject Young’s nomination.

State Department must stand up for journalists detained on flotillas


Israel continues to hold American journalists captured in international waters aboard aid flotillas. The latest are Jewish Currents reporter Emily Wilder and Drop Site News reporter Noa Avishag Schnall. Previously, Israel detained Drop Site News reporter Alex Colston, who has said he and other detainees were abused and denied medical care.

But the State Department is doing little if anything about these detainments, presumably because the journalists in question don’t agree with the administration’s policies. Lawmakers need to raise their voices and pressure the administration to do more.

Write to your member of Congress here.

Student journalists fight Trump’s anti-speech deportations


It’s not every day a student newspaper takes on the federal government. But that’s exactly what The Stanford Daily is doing.

The Daily sued Secretary of State Marco Rubio and Secretary of Homeland Security Kristi Noem in August over the Trump administration’s push to deport foreign students for exercising free speech, like writing op-eds and attending protests.

We spoke at the start of Stanford University’s fall term with Editor-in-Chief Greta Reich about why the Daily is fighting back. Read more here.

It’s time to end the SEC gag rule


We’ve written before about the unconstitutionality of the Securities and Exchange Commission’s “gag rule,” which bars those who settle with the SEC from talking to reporters, to protect the SEC’s reputation.

We shouldn’t need to say this, but the government doesn’t get to censor its critics to make itself look good. Last week, we filed a legal brief explaining to a federal appellate court why the ridiculous rule must be struck down. Read the brief here.

What we’re reading


ICE goes masked for a single reason (The New York Times). FPF’s Adam Rose tells the Times that immigration officers “seem to feel they can just willy-nilly shoot tear gas canisters at people and shoot them with foam rounds that can permanently maim people.”

The New York Times wins right to obtain info Musk wanted kept private (The New Republic). A court ruled that the public’s interest in knowing if Elon Musk has a security clearance and access to classified information outweighs any potential privacy interests.

Press Freedom Partnership newsletter (The Washington Post). “Journalists who are considering covering the story are going to think twice about it and stay home because they don’t want to be jailed and shot. It’s a major problem,” we told the Post about law enforcement targeting journalists covering anti-deportation protests in and around Chicago.

Journalism has become more challenging, for reporters and sources (Sentient). Sources have backed out of news stories — even seemingly uncontroversial ones — out of fear of being targeted by the Trump administration.

MAGA slams ‘fake news’ but embraces ‘The Benny Show’s’ misinformation (Straight Arrow News). “Plenty of past presidents would have loved to exclude serious journalists … and bring in the Benny Johnsons of their time. They just were under the impression that the public wouldn’t tolerate that,” we told Straight Arrow News. Now it’s up to the public to prove those past presidents right and the current one wrong.


freedom.press/issues/fight-for…



Court backs Chicago reporters, but leaves door open for dispersals


A federal judge just reminded the government that the First Amendment still applies in Chicago.

On Oct. 9, Chicago journalists and protesters scored a major legal win, when Judge Sara Ellis issued a temporary restraining order reigning in federal officers’ repeated First Amendment violations at protests.

It’s a big victory for press freedom. The order prohibits arrests and use of physical force against journalists and restricts the use of dangerous crowd-control munitions. It defines “journalists” broadly, in a way that includes independent, freelance, and student reporters. It also enhances transparency by requiring federal officers to wear “visible identification,” like a unique serial number.

This order and similar rulings in Los Angeles last month are powerful reminders that journalists working together can vindicate their rights in the courts. They also highlight the crucial role that independent journalists and smaller news organizations play in defending press freedom. In both Chicago and Los Angeles, it’s been freelancers, community news outlets, local press clubs, and unions who’ve taken the lead, teaming up with protesters, legal observers, and clergy to take the government to court.

Unconstitutional dispersals of press still possible

But the fight isn’t over. The Chicago order unfortunately leaves open the possibility that, at least in some instances, federal officers may order journalists to leave areas where protests are being broken up or officers are attacking protesters.

Although the order prohibits dispersal of journalists from protests as a general matter, it also states that officers can “order” journalists to “change location to avoid disrupting law enforcement,” as long as they have “an objectively reasonable time to comply and an objectively reasonable opportunity to report and observe.” (In contrast, a similar order in Los Angeles states only that federal officers may “ask” journalists to change location.)

Federal officers are likely to use this as a loophole to continue to violently remove the press from protests, on the pretext that it’s necessary to avoid disruption. The order’s requirement that press must be able to continue to report and observe is also too lax; far better would have been an order specifically requiring that press be able to continue to see and hear the protest and law enforcement response.

Even when police can disperse protesters who break the law, the First Amendment doesn’t allow them to disperse journalists, too.

The weaker language around dispersals of journalists in the court’s order is a shame, especially for the public’s right to know. In recent days, Chicago journalists have been reporting about the violent tactics used by federal agents to disperse protests. If journalists can be ordered to leave alongside protesters, they can’t observe what’s happening or capture the images they need to keep the public informed.

It also makes dispersals more dangerous for protesters. As Unraveled Press noted, “Again and again, we’ve seen cops are most likely to get more violent with demonstrators when out of public view.” (Unraveled Press co-founder Raven Geary is a plaintiff in the Chicago lawsuit.) And while the court’s order prohibits dispersal orders aimed at peaceful protesters, if federal officers violate that order and also disperse the press to avoid a “disruption,” it will be much harder for the public to learn about it.

By declining to simply prohibit federal officers from dispersing the press, except when necessary to serve an essential government need such as public safety, the court also got the law wrong. Even when police can disperse protesters who break the law, the First Amendment doesn’t allow them to disperse journalists, too.

We’re not the only ones who say so. Just last year, the Department of Justice issued guidance stating as much:

“In the case of mass demonstrations, there may be situations—such as dispersal orders or curfews—where the police may reasonably limit public access. In these circumstances, to ensure that these limitations are narrowly tailored, the police may need to exempt reporters from these restrictions. …”

The DOJ also said so in a previous report, reprimanding the Minneapolis Police Department for its suppression of protesters and the press following George Floyd’s murder:

“The First Amendment requires that any restrictions on when, where, and how reporters gather information ‘leave open ample alternative channels’ for gathering the news. Blanket enforcement of dispersal orders and curfews against press violates this principle because they foreclose the press from reporting about what happens after the dispersal or curfew is issued, including how police enforce those orders.”

And in an important decision from 2020, the federal court of appeals in the 9th Circuit also disapproved of blanket dispersal orders being enforced against the press. That case arose from very similar circumstances to those today: federal authorities abusing the First Amendment while policing federal property during Black Lives Matter protests in Portland, Oregon.

In the 2020 case, the 9th Circuit affirmed a legal order that exempted journalists from general dispersal orders issued by the federal government. Journalists, it wrote, “cannot be punished for the violent acts of others.”

These authorities make it clear: Journalists cannot be ordered to move simply because it would be more convenient for officers. Journalists can only be dispersed if it’s essential to a compelling government interest, and only if they continue to have another vantage point from which they can see and hear what’s going on in order to report.

It’s frustrating that the court’s order leaves the door open for the government to evade this well-established principle. But the fight isn’t over. The court’s temporary restraining order is just a first step. When it issues a more permanent ruling, it will have another opportunity to get the prohibition on dispersing the press right.


freedom.press/issues/court-bac…



La convenienza di limitare il pensiero


@Giornalismo e disordine informativo
articolo21.org/2025/10/la-conv…
Leggiamo ciò che siamo e leggiamo sempre meno. A dilrlo, già nel maggio scorso durante il Salone del libro di Torino l’Associazione Italiana Editori (AIE) che aveva rilevato come l’andamento dell’editoria stesse subendo un calo importante delle vendite,




Wizard Bisan, oggi




This week, we discuss a ransomware gang, book bans, and infrastructure.

This week, we discuss a ransomware gang, book bans, and infrastructure.#BehindTheBlog


Behind the Blog: Sinkholes and Site Seizures


This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss a ransomware gang, book bans, and infrastructure.

JOSEPH: I thought I’d give you something from the digital underground that happened last night. So recently a group that goes by the name Scattered LAPSUS$ Hunters (I know, it’s a mouthful) has been threatening to dump data from customers of Salesforce. The group’s name is an amalgamation of a bunch of other English-speaking loosely connected hacking groups: Scattered Spider, LAPSUS$, Shiny Hunters, etc. This latest iteration is trying to get Salesforce to pay a ransom; Salesforce says it won’t. The group says it has data from all sorts of companies, including Disney/Hulu, FedEx, Toyota, UPS, and many more.

This post is for subscribers only


Become a member to get access to all content
Subscribe now




Il Senato sblocca 914 miliardi e rilancia la strategia Usa di difesa

@Notizie dall'Italia e dal mondo

Dopo settimane di stallo procedurale, il Senato degli Stati Uniti ha approvato a larga maggioranza la propria versione del National defense authorization act (Ndaa), riportando il dossier difesa al centro dell’agenda di Washington. La mossa sblocca il confronto con la Camera e apre



Dpp, luci e ombre del nuovo documento strategico della Difesa. L’analisi del gen. Camporini

@Notizie dall'Italia e dal mondo

In questi giorni le Camere hanno ricevuto il nuovo Documento programmatico pluriennale (Dpp) della Difesa 2025-2027. La pubblicazione del documento, prodotto dal ministero della Difesa, rappresenta un appuntamento annuale di grande importanza per analizzare le



Pazienti INconsapevoli - allerta per la vasta truffa in corso.


@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/pazienti…
Io le odio le applicazioni usate dai medici pigri e, a causa di una di queste, è allarme rosso, defcon 1, catastrofe globale! Chiunque abbia acquistato in una delle 112 farmacie che hanno attivato Medical Live -



Ho visto uno comprare un pezzo di Grana all'Autogrill.

Prima volta in 56 anni.

Con quello che l'avrà pagato poteva diventare socio di maggioranza in un caseificio...



Piero Ignazi a TPI: “Ecco perché Gaza riempie le piazze ma non le urne”


@Politica interna, europea e internazionale
Piero Ignazi, il centrosinistra è reduce dalla sconfitta alle elezioni regionali nelle Marche e in Calabria. Nelle Marche, in particolare, secondo alcuni osservatori, si è dato molto spazio alla questione palestinese e poco ai problemi dei cittadini. Lei



Meta says that its coders should be working five times faster and that it expects "a 5x leap in productivity."#AI #Meta #Metaverse #wired


Meta Tells Workers Building Metaverse to Use AI to ‘Go 5x Faster’


This article was produced with support from WIRED.

A Meta executive in charge of building the company’s metaverse products told employees that they should be using AI to “go 5x faster” according to an internal message obtained by 404 Media .

“Metaverse AI4P: Think 5X, not 5%,” the message, posted by Vishal Shah, Meta’s VP of Metaverse, said (AI4P is AI for Productivity). The idea is that programmers should be using AI to work five times more efficiently than they are currently working—not just using it to go 5 percent more efficiently.

“Our goal is simple yet audacious: make Al a habit, not a novelty. This means prioritizing training and adoption for everyone, so that using Al becomes second nature—just like any other tool we rely on,” the message read. “It also means integrating Al into every major codebase and workflow.” Shah added that this doesn’t just apply to engineers. “I want to see PMs, designers, and [cross functional] partners rolling up their sleeves and building prototypes, fixing bugs, and pushing the boundaries of what's possible,” he wrote. “I want to see us go 5X faster by eliminating the frictions that slow us down. And 5X faster to get to how our products feel much more quickly. Imagine a world where anyone can rapidly prototype an idea, and feedback loops are measured in hours—not weeks. That's the future we're building.”

Meta’s metaverse products, which CEO Mark Zuckerberg renamed the company to highlight, have been a colossal timesink and money pit, with the company spending tens of billions of dollars developing a product that relatively few people use.

Zuckerberg has spoken extensively about how he expects AI agents to write most of Meta’s code within the next 12 to 18 months. The company also recently decided that job candidates would be allowed to use AI as part of their coding tests during job interviews. But Shah’s message highlights a fear that workers have had for quite some time: That bosses are not just expecting to replace workers with AI, they are expecting those who remain to use AI to become far more efficient. The implicit assumption is that the work that skilled humans do without AI simply isn’t good enough. At this point, most tech giants are pushing AI on their workforces. Amazon CEO Andy Jassy told employees in July that he expects AI to completely transform how the company works—and lead to job loss. "In the next few years, we expect that this will reduce our total corporate workforce as we get efficiency gains from using AI extensively across the company," he said.

Many experienced software engineers feel like AI coding agents are creating a new crisis, where codebases contain bugs and errors that are difficult to fix since humans don’t necessarily know how specific code was written or what it does. This means a lot of engineers have become babysitters who have to fix vibe coded messes written by AI coding agents.

In the last few weeks, a handful of blogs written by coders have gone viral, including ones with titles such as: “Vibe coding is creating braindead coders,” “Vibe coding: Because who doesn’t love surprise technical debt!?,” “Vibe/No code Tech Debt,” and “Comprehension Debt: The Ticking Time Bomb of LLM-Generated Code.”

In his message, Shah said that “we expect 80 percent of Metaverse employees to have integrated AI into their daily work routines by the end of this year, with rapid growth in engineering usage and a relentless focus on learning from the time and output we gain.” He went on to reference a series of upcoming trainings and internal documents about AI coding, including two “Metaverse day of AI learning” events.

“Dedicate the time. Take the training seriously. Share what you learn, and don’t be afraid to experiment,” he added. “The more we push ourselves, the more we’ll unlock. A 5X leap in productivity isn’t about small incremental improvements, it’s about fundamentally rethinking how we work, build, and innovate.” He ended the post with a graphic featuring a futuristic building with the words “Metaverse AI4P Think 5X, not 5%” superimposed on top.

A Meta spokesperson told 404 Media “it's well-known that this is a priority and we're focused on using AI to help employees with their day-to-day work."




📣 #Scuola, da oggi alle ore 14 fino alle ore 23.59 del 29 ottobre 2025 si potrà presentare istanza di partecipazione alle procedure concorsuali ordinarie per posti comuni e di sostegno nella scuola dell'infanzia, primaria e nella scuola secondaria.