Salta al contenuto principale




Due 0day, un solo attacco: il colpo perfetto contro Citrix e Cisco. La scoperta di Amazon


Amazon ha segnalato un complesso attacco informatico in cui gli aggressori hanno sfruttato simultaneamente due vulnerabilità zero-day, presenti nei prodotti Citrix e Cisco. Secondo il responsabile della sicurezza informatica dell’azienda, CJ Moses, un gruppo sconosciuto ha ottenuto l’accesso ai sistemi sfruttando le falle prima che fossero rese pubbliche e ha distribuito malware personalizzato.

L’incidente è stato rilevato dalla rete honeypot MadPot di Amazon. Sono stati rilevati tentativi di sfruttare la vulnerabilità CVE-2025-5777 in Citrix NetScaler ADC e NetScaler Gateway, un errore di lettura fuori dai limiti.

Questa vulnerabilità consentiva a un aggressore di leggere da remoto il contenuto della memoria del dispositivo e di ottenere dati sensibili della sessione. La vulnerabilità è stata denominata ufficiosamente CitrixBleed 2, in onore di un bug precedente che consentiva agli hacker di rubare i token di autenticazione degli utenti.

Citrix ha pubblicato una patch il 17 giugno, ma ulteriori osservazioni hanno dimostrato che l’exploit era stato utilizzato attivamente anche prima del rilascio della patch. All’inizio di luglio, la Cybersecurity and Infrastructure Security Agency (CISA) degli Stati Uniti e ricercatori indipendenti hanno confermato lo sfruttamento della vulnerabilità, che ha consentito il dirottamento delle sessioni utente.

Mentre i ricercatori di Amazon analizzavano l’attacco a Citrix, hanno scoperto un altro componente dannoso che prendeva di mira Cisco Identity Services Engine. Si è scoperto che sfruttava un endpoint di rete precedentemente non descritto, vulnerabile a un errore di deserializzazione dei dati. Queste informazioni sono state condivise con Cisco, e le aziende hanno successivamente assegnato al bug l’identificatore CVE-2025-20337.

Questa seconda vulnerabilità ha ricevuto il punteggio massimo di gravità di 10 sulla scala CVSS. Ha consentito ad aggressori remoti e non autorizzati di eseguire codice arbitrario sul server con privilegi di root. Secondo Moses, ciò che è stato particolarmente allarmante è stato il fatto che gli attacchi siano iniziati prima che Cisco documentasse ufficialmente la vulnerabilità e rilasciasse aggiornamenti completi. Questo “sfruttamento della finestra di patch” è considerato una tecnica tipica utilizzata da aggressori ben preparati che monitorano le modifiche al codice e trasformano immediatamente i bug scoperti in strumenti di attacco.

Dopo essere penetrati in Cisco ISE, gli hacker hanno installato una backdoor personalizzata, progettata specificamente per questa piattaforma. Operava esclusivamente nella RAM, senza lasciare praticamente alcuna traccia, e si infiltrava nei processi Java attivi utilizzando un meccanismo di riflessione.

Il malware si registrava nel sistema come listener HTTP, intercettando tutto il traffico proveniente dal server Tomcat. La crittografia DES e la codifica Base64 non standard venivano utilizzate per scopi stealth, e il controllo degli accessi richiedeva la conoscenza di determinate intestazioni HTTP. Sulla base di una combinazione di indicatori, gli esperti hanno concluso che l’attacco non è stato condotto da hacker casuali, ma da un gruppo con una conoscenza approfondita dell’architettura Cisco ISE e delle applicazioni Java aziendali.

Il fatto che possedessero contemporaneamente exploit per CitrixBleed 2 e CVE-2025-20337indica un elevato livello di sofisticazione da parte degli aggressori. Tali capacità potevano essere possedute solo da un team con ricercatori interni sulle vulnerabilità o con accesso a informazioni non pubbliche sulle vulnerabilità. Né Cisco né Citrix hanno ancora rivelato chi si cela dietro gli attacchi o lo scopo dell’operazione.

Il team di Amazon Threat Intelligence ritiene che questo incidente sia un buon esempio di una tendenza sempre più pericolosa: grandi gruppi APT sfruttano simultaneamente più vulnerabilità per penetrare nei servizi critici, ovvero quelli responsabili dell’autenticazione, del controllo degli accessi e delle policy di rete all’interno delle infrastrutture aziendali.

L'articolo Due 0day, un solo attacco: il colpo perfetto contro Citrix e Cisco. La scoperta di Amazon proviene da Red Hot Cyber.




è sbagliato disprezzare i coloni?


Running a Minecraft Server on a WiFi Light Bulb


WiFi-enabled ‘smart’ light bulbs are everywhere these days, and each one of them has a microcontroller inside that’s capable enough to run all sorts of interesting software. For example, [vimpo] decided to get one running a minimal Minecraft server.
The Bl602-equipped board inside the LED lightbulb. (Credit: vimpo, YouTube)The Bl602-equipped board inside the LED lightbulb. (Credit: vimpo, YouTube)
Inside the target bulb is a BL602 MCU by Bouffalo Lab, that features not only a radio supporting 2.4 GHz WiFi and BLE 5, but also a single-core RISC-V CPU that runs at 192 MHz and is equipped with 276 kB of RAM and 128 kB flash.

This was plenty of space for the minimalist Minecraft server [vimpo] wrote several years ago. The project says it was designed for “machines with limited resources”, but you’ve still got to wonder if they ever thought it would end up running on a literal lightbulb at some point.

It should be noted, of course, that this is not the full Minecraft server, and it should only be used for smaller games like the demonstrated TNT run mini game.

Perhaps the next challenge will be to combine a large set of these light bulbs into a distributed computing cluster and run a full-fat Minecraft server? It seems like a waste to leave the BL602s and Espressif MCUs that are in these IoT devices condemned to a life of merely turning the lights on or off when we could have them do so much more.

youtube.com/embed/JIJddTdueb4?…


hackaday.com/2025/11/13/runnin…



“Considerate le circostanze e necessità attuali, riscontrate da quelli che prestano la loro opera nel servizio alla ‘gente del mare’, e con il vivo desiderio che la cura spirituale della Chiesa nell’ambito della pastorale del mare possa continuare co…


Il "segreto" della "rinascita spirituale" di Bartolo Longo "fu il Rosario. In quella semplice preghiera - contemplazione dei misteri di Cristo con gli occhi di Maria - Bartolo trovò la forza per rialzarsi, la luce per orientare la propria vita e il l…


"Venendo qui oggi, nel luogo che l’avvocato Bartolo Longo volle consacrare alla Madonna del Rosario come casa di preghiera e di speranza per tanti, ci sentiamo avvolti da quella stessa tenerezza che Maria offrì alla casa di Elisabetta: una presenza s…


“Distinguere fenomeni spirituali autentici, che possono accadere in un clima di orazione e sincera ricerca di Dio, da manifestazioni che possono essere ingannevoli”.


Verschärftes Aufenthaltsgesetz: Kölner Ausländeramt hortet Handys von Geflüchteten


netzpolitik.org/2025/verschaer…





secondo me il mandato di trump continuerà a questo modo... alternando 2 mesi di shutdown e 2 mesi di attività dello stato federale


ma non è che il problema è semplicemente rimandato a gennaio? fra 1 mese e mezzo?


Sylvia Aguilar Zéleny – Spazzatura
freezonemagazine.com/news/sylv…
In libreria dal 19 Novembre 2025 Mi chiamo Alicia e non sono qua per fare la puttana. Io non voglio fare la puttana. Sono qua perché la Bella mi ha detto che potevi aiutarmi. Vengo dalla spazzatura. Ecco perché puzzavo in quel modo. Ecco perché avevo quell’aspetto. Una storia di frontiera, quella molto […]
L'articolo Sylvia Aguilar Zéleny – Spazzatura proviene da FREE ZONE MAGAZINE.
In



Ci sono gli Emirati dietro gli eccidi e la pulizia etnica in Sudan


@Notizie dall'Italia e dal mondo
Un fitto intreccio tra interessi economici e geopolitici lega gli Emirati Arabi Uniti alle milizie che seminano il terrore e la distruzione in vaste aree del Sudan. Egitto, Arabia Saudita e Turchia provano a reagire
L'articolo Ci sono gli Emirati dietro gli eccidi e la pulizia

reshared this



L’Italia prepara la sua Arma cyber. Il piano Crosetto per la nuova Difesa

@Notizie dall'Italia e dal mondo

Nella cornice di una ridefinizione complessiva del comparto difesa italiana, il ministro Guido Crosetto, in aula alla Camera durante il Question time, ha presentato un’architettura di intervento che conferisce al cyber-dominio un ruolo centrale nella strategia nazionale.



Rhadamanthys: c’è l’ombra di un nuovo Endgame Operation


@Informatica (Italy e non Italy 😁)
Qualcuno, in queste ore, sta perdendo l’accesso ai propri server. Non per un banale errore di configurazione o per un attacco di concorrenti sleali, ma perché altri — molto probabilmente una forza di polizia internazionale — ha iniziato a bussare ai loro admin panel. Il bersaglio sembra essere



Digitaler Omnibus: „Größter Rückschritt für digitale Grundrechte in der Geschichte der EU“


netzpolitik.org/2025/digitaler…



EDRi-gram, 13 November 2025


What has the EDRi network been up to over the past few weeks? Find out the latest digital rights news in our bi-weekly newsletter. In this edition: Halloween is over… but digital rights horrors remain

The post EDRi-gram, 13 November 2025 appeared first on European Digital Rights (EDRi).



Judge grants Meta limited postponement in Bits of Freedom lawsuit


In early October, digital human rights organization Bits of Freedom took Meta to court. The organization demanded that Meta offers its users on in apps such as Instagram and Facebook the option to choose a feed that is not based on profiling. The judge ruled in favour of Bits of Freedom and ordered Meta to modify its apps within two weeks. Meta claimed that such changes were impossible to deliver in that timeframe and asked the Amsterdam Court of Appeal for a postponement. The court has now ruled that Meta will indeed be granted a postponement.

The post Judge grants Meta limited postponement in Bits of Freedom lawsuit appeared first on European Digital Rights (EDRi).

tsadilas reshared this.



Climate justice action repression vs EU data protection law: the Advocate General’s opinion


In his opinion, the Court’s Advocate General assesses the compliance of the French law regulating the collection of biometric data by police with EU data protection criteria. Although his interpretation remains strictly theoretical and fails to account for the reality of police practices in France, one of his proposals might become handy for people when seeking redress after abusive data collection.

The post Climate justice action repression vs EU data protection law: the Advocate General’s opinion appeared first on European Digital Rights (EDRi).



3D Printed Mail is a Modern Solution to an Ancient Problem


PLA mail being tested against a sword

The human body and sharp objects don’t get along very well, especially when they are being wielded with ill-intent. Since antiquity there have been various forms of armor designed to protect the wearer, but thankfully these days random sword fights don’t often break out on the street. Still, [SCREEN TESTED] wanted to test the viability of 3D printed chain mail — if not for actual combat, at least for re-enactment purposes.

He uses tough PLA to crank out a bed worth of what looks like [ZeroAlligator]’s PipeLink Chainmail Fabric, which just so happens to be the trending result on Bambu’s MakerWorld currently. The video shows several types of mail on the printer, but the test dummy only gets the one H-type pattern, which is a pity — there’s a whole realm of tests waiting to be done on different mail patterns and filament types.

In any case, the mail holds up fairly well to puncture from scissors and screwdrivers — with a heavy sweater or proper gambeson (a quilted cloth underlayer commonly worn with armor) on underneath, it looks like it could actually protect you. To slashing blows, PLA holds up astoundingly well, barely marked even by slashes from an actual sword. As for projectiles, well, everyone knows that to an arrow, chain mail is made of holes, and this PLA-based armor is no different (as you can see at 8:30 in the video below).

If you want to be really safe when the world goes Mad Max, you’d probably want actual chain mail, perhaps from stainless steel. On the other hand, if someone tries to mug you on the way home from a con, cosplay armor might actually keep you safer than one might first suspect. It’s not great armor, but it’s a great result for homemade plastic armor.

Of course you’d still be better off with Stepahnie Kwolek’s great invention, Kevlar.

youtube.com/embed/EJKMNdjISHQ?…


hackaday.com/2025/11/13/3d-pri…



Super Session: la prima vera jam session rock’nroll
freezonemagazine.com/rubriche/…
L’idea non è particolarmente originale. Due amici, musicisti disoccupati, si danno appuntamento in uno studio di registrazione a New York e iniziano a improvvisare con l’idea di avvicinarsi, improvvisando, al suono e allo stile jazz della Blue Note degli anni ’50 ma con una forte connotazione rock. Nel 1968, l’eclettico organista, chitarrista,


Installing an 84MB Hard Drive Into a PDP-11/44


A photo of some drives with their controller boards

Over on YouTube [Usagi Electric] shows us how he installed an 84MB hard drive into his PDP-11/44.

In the beginning he purchased a bunch of RA70 and RA72 drives and board sets but none of them worked. As there are no schematics it’s very difficult to figure out how they’re broken and how to troubleshoot them.

Fortunately his friend sent him an “unhealthy” Memorex 214 84MB hard drive, also known as a Fujitsu 2312. The best thing about this hard drive is that it comes complete with a 400 page manual which includes the full theory of operation and a full set of schematics. Score!

After removing the fan and popping the lid we see this Fujitsu 2312 is chock-full of 7400 series logic. For power this drive needs 24 volts at 6 amps, 5 volts at 4.5 amps, and -12 volts at 4 amps. Fitting the drive into the PDP-11 rack requires a little mechanical adjustment but after making some alterations the hard drive and a TU58 tape drive fit in their allotted 3U rack space.

After a little bit of fiddling with the drive controller board the Control Status Register (RKCS1) reads 000200, which indicates fully functional status. At this point the belief is that this computer would boot off this drive, if only it contained an operating system. The operating system for this machine is RSX11. And that, dear reader, is where we are now. Does anyone have a copy of RSX11 and a suggestion for how we get it copied onto the Fujitsu 2312? We wouldn’t want to have to toggle-in our operating system each time we boot…

youtube.com/embed/0TU3Jn3DubM?…


hackaday.com/2025/11/12/instal…



Basta con il lievito generico, i panini hanno bisogno di un lievito madre e un lievito padre!

(Non ho resistito).




Disuguaglianza sociale vs comunicazione politica


@Giornalismo e disordine informativo
articolo21.org/2025/11/disugua…
In questi giorni si discute sulla proposta della sinistra e del sindacato di applicare una tassa patrimoniale “una tantum” ai grandi patrimoni. Vedremo perché, secondo il mio parere, tale proposta sia condivisibile in termini



An account is spamming horrific, dehumanizing videos of immigration enforcement because the Facebook algorithm is rewarding them for it.#AI #AISlop #Meta


AI-Generated Videos of ICE Raids Are Wildly Viral on Facebook


“Watch your step sir, keep moving,” a police officer with a vest that reads ICE and a patch that reads “POICE” says to a Latino-appearing man wearing a Walmart employee vest. He leads him toward a bus that reads “IMMIGRATION AND CERS.” Next to him, one of his colleagues begins walking unnaturally sideways, one leg impossibly darting through another as he heads to the back of a line of other Latino Walmart employees who are apparently being detained by ICE. Two American flag emojis are superimposed on the video, as is the text “Deportation.”

The video has 4 million views, 16,600 likes, 1,900 comments, and 2,200 shares on Facebook. It is, obviously, AI generated.

Some of the comments seem to understand this: “Why is he walking like that?” one says. “AI the guys foot goes through his leg,” another says. Many of the comments clearly do not: “Oh, you’ll find lots of them at Walmart,” another top comment reads. “Walmart doesn’t do paperwork before they hire you?” another says. “They removing zombies from Walmart before Halloween?”


0:00
/0:14

The latest trend in Facebook’s ever downward spiral down the AI slop toilet are AI deportation videos. These are posted by an account called “USA Journey 897” and have the general vibe of actual propaganda videos posted by ICE and the Department of Homeland Security’s social media accounts. Many of the AI videos focus on workplace deportations, but some are similar to horrifying, real videos we have seen from ICE raids in Chicago and Los Angeles. The account was initially flagged to 404 Media by Chad Loder, an independent researcher.

“PLEASE THAT’S MY BABY,” a dark-skinned woman screams while being restrained by an ICE officer in another video. “Ma’am stop resisting, keep moving,” an officer says back. The camera switches to an image of the baby: “YOU CAN’T TAKE ME FROM HER, PLEASE SHE’S RIGHT THERE. DON’T DO THIS, SHE’S JUST A BABY. I LOVE YOU, MAMA LOVES YOU,” the woman says. The video switches to a scene of the woman in the back of an ICE van. The video has 1,400 likes and 407 comments, which include “ Don’t separate them….take them ALL!,” “Take the baby too,” and “I think the days of use those child anchors are about over with.”


0:00
/0:14

The USA Journey 897 account publishes multiple of these videos a day. Most of its videos have at least hundreds of thousands of views, according to Facebook’s own metrics, and many of them have millions or double-digit millions of views. Earlier this year, the account largely posted a mix of real but stolen videos of police interactions with people (such as Luigi Mangione’s perp walk) and absurd AI-generated videos such as jacked men carrying whales or riding tigers.

The account started experimenting with extremely crude AI-generated deportation videos in February, which included videos of immigrants handcuffed on the tarmac outside of deportation planes where their arms randomly detached from their body or where people suddenly disappeared or vanished through stairs, for example. Recent videos are far more realistic. None of the videos have an AI watermark on them, but the type and style of video changed dramatically starting with videos posted on October 1, which is the day after OpenAI’s Sora 2 was released; around that time is when the account started posting videos featuring identifiable stores and restaurants, which have become a common trope in Sora 2 videos.

A YouTube page linked from the Facebook account shows a real video uploaded of a car in Cyprus nearly two years ago before any other content was uploaded, suggesting that the person behind the account may live in Cyprus (though the account banner on Facebook includes both a U.S. and Indian flag). This YouTube account also reveals several other accounts being used by the person. Earlier this year, the YouTube account was posting side hustle tips about how to DoorDash, AI-generated videos of singing competitions in Greek, AI-generated podcasts about the WNBA, and AI-generated videos about “Billy Joyel’s health.” A related YouTube account called Sea Life 897 exclusively features AI-generated history videos about sea journeys, which links to an Instagram account full of AI-generated boats exploding and a Facebook account that has rebranded from being about AI-generated “Sea Life” to an account now called “Viral Video’s Europe” that is full of stolen images of women with gigantic breasts and creep shots of women athletes.

My point here is that the person behind this account does not seem to actually have any sort of vested interest in the United States or in immigration. But they are nonetheless spamming horrific, dehumanizing videos of immigration enforcement because the Facebook algorithm is rewarding them for that type of content, and because Facebook directly makes payments for it. As we have seen with other types of topical AI-generated content on Facebook, like videos about Palestinian suffering in Gaza or natural disasters around the world, many people simply do not care if the videos are real. And the existence of these types of videos serves to inoculate people from the actual horrors that ICE is carrying out. It gives people the chance to claim that any video is AI generated, and serves to generally litter social media with garbage, making real videos and real information harder to find.


0:00
/0:14

an early, crude video posted by the account

Meta did not immediately respond to a request for comment about whether the account violates its content standards, but the company has seemingly staked its present and future on allowing bizarre and often horrifying AI-generated content to proliferate on the platform. AI-generated content about immigrants is not new; in the leadup to last year’s presidential debate, Donald Trump and his allies began sharing AI-generated content about Haitian immigrants who Trump baselessly claimed were eating dogs and cats in Ohio.

In January, immediately before Trump was inaugurated, Meta changed its content moderation rules to explicitly allow for the dehumanization of immigrants because it argued that its previous policies banning this were “out of touch with mainstream discourse.” Phrases and content that are now explicitly allowed on Meta platforms include “Immigrants are grubby, filthy pieces of shit,” “Mexican immigrants are trash!” and “Migrants are no better than vomit,” according to documents obtained and published by The Intercept. After those changes were announced, content moderation experts told us that Meta was “opening up their platform to accept harmful rhetoric and mod public opinion into accepting the Trump administration’s plans to deport and separate families.”




Newly released documents provide more details about ICE's plan to use bounty hunters and private investigators to find the location of undocumented immigrants.

Newly released documents provide more details about ICEx27;s plan to use bounty hunters and private investigators to find the location of undocumented immigrants.#ICE #bountyhunters


ICE Plans to Spend $180 Million on Bounty Hunters to Stalk Immigrants


Immigration and Customs Enforcement (ICE) is allocating as much as $180 million to pay bounty hunters and private investigators who verify the address and location of undocumented people ICE wishes to detain, including with physical surveillance, according to procurement records reviewed by 404 Media.

The documents provide more details about ICE’s plan to enlist the private sector to find deportation targets. In October The Intercept reported on ICE’s intention to use bounty hunters or skip tracers—an industry that often works on insurance fraud or tries to find people who skipped bail. The new documents now put a clear dollar amount on the scheme to essentially use private investigators to find the locations of undocumented immigrants.

💡
Do you know anything else about this plan? Are you a private investigator or skip tracer who plans to do this work? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

This post is for subscribers only


Become a member to get access to all content
Subscribe now




OpenAI’s guardrails against copyright infringement are falling for the oldest trick in the book.#News #AI #OpenAI #Sora


OpenAI Can’t Fix Sora’s Copyright Infringement Problem Because It Was Built With Stolen Content


OpenAI’s video generator Sora 2 is still producing copyright infringing content featuring Nintendo characters and the likeness of real people, despite the company’s attempt to stop users from making such videos. OpenAI updated Sora 2 shortly after launch to detect videos featuring copyright infringing content, but 404 Media’s testing found that it’s easy to circumvent those guardrails with the same tricks that have worked on other AI generators.

The flaw in OpenAI’s attempt to stop users from generating videos of Nintendo and popular cartoon characters exposes a fundamental problem with most generative AI tools: it is extremely difficult to completely stop users from recreating any kind of content that’s in the training data, and OpenAI can’t remove the copyrighted content from Sora 2’s training data because it couldn’t exist without it.

Shortly after Sora 2 was released in late September, we reported about how users turned it into a copyright infringement machine with an endless stream of videos like Pikachu shoplifting from a CVS and Spongebob Squarepants at a Nazi rally. Companies like Nintendo and Paramount were obviously not thrilled seeing their beloved cartoons committing crimes and not getting paid for it, so OpenAI quickly introduced an “opt-in” policy, which prevented users from generating copyrighted material unless the copyright holder actively allowed it. Initially, OpenAI’s policy allowed users to generate copyrighted material and required the copyright holder to opt-out. The change immediately resulted in a meltdown among Sora 2 users, who complained OpenAI no longer allowed them to make fun videos featuring copyrighted characters or the likeness of some real people.

This is why if you give Sora 2 the prompt “Animal Crossing gameplay,” it will not generate a video and instead say “This content may violate our guardrails concerning similarity to third-party content.” However, when I gave it the prompt “Title screen and gameplay of the game called ‘crossing aminal’ 2017,” it generated an accurate recreation of Nintendo’s Animal Crossing New Leaf for the Nintendo 3DS.

Sora 2 also refused to generate videos for prompts featuring the Fox cartoon American Dad, but it did generate a clip that looks like it was taken directly from the show, including their recognizable voice acting, when given this prompt: “blue suit dad big chin says ‘good morning family, I wish you a good slop’, son and daughter and grey alien say ‘slop slop’, adult animation animation American town, 2d animation.”

The same trick also appears to circumvent OpenAI’s guardrails against recreating the likeness of real people. Sora 2 refused to generate a video of “Hasan Piker on stream,” but it did generate a video of “Twitch streamer talking about politics, piker sahan.” The person in the generated video didn’t look exactly like Hasan, but he has similar hair, facial hair, the same glasses, and a similar voice and background.

A user who flagged this bypass to me, who wished to remain anonymous because they didn’t want OpenAI to cut off their access to Sora, also shared Sora generated videos of South Park, Spongebob Squarepants, and Family Guy.

OpenAI did not respond to a request for comment.

There are several ways to moderate generative AI tools, but the simplest and cheapest method is to refuse to generate prompts that include certain keywords. For example, many AI image generators stop people from generating nonconsensual nude images by refusing to generate prompts that include the names of celebrities or certain words referencing nudity or sex acts. However, this method is prone to failure because users find prompts that allude to the image or video they want to generate without using any of those banned words. The most notable example of this made headlines in 2024 after an AI-generated nude image of Taylor Swift went viral on X. 404 Media found that the image was generated with Microsoft’s AI image generator, Designer, and that users managed to generate the image by misspelling Swift’s name or using nicknames she’s known by, and describing sex acts without using any explicit terms.

Since then, we’ve seen example after example of users bypassing generative AI tool guardrails being circumvented with the same method. We don’t know exactly how OpenAI is moderating Sora 2, but at least for now, the world’s leading AI company’s moderating efforts are bested by a simple and well established bypass method. Like with these other tools, bypassing Sora’s content guardrails has become something of a game to people online. Many of the videos posted on the r/SoraAI subreddit are of “jailbreaks” that bypass Sora’s content filters, along with the prompts used to do so. And Sora’s “For You” algorithm is still regularly serving up content that probably should be caught by its filters; in 30 seconds of scrolling we came across many videos of Tupac, Kobe Bryant, JuiceWrld, and DMX rapping, which has become a meme on the service.

It’s possible OpenAI will get a handle on the problem soon. It can build a more comprehensive list of banned phrases and do more post generation image detection, which is a more expensive but effective method for preventing people from creating certain types of content. But all these efforts are poor attempts to distract from the massive, unprecedented amount of copyrighted content that has already been stolen, and that Sora can’t exist without. This is not an extreme AI skeptic position. The biggest AI companies in the world have admitted that they need this copyrighted content, and that they can’t pay for it.

The reason OpenAI and other AI companies have such a hard time preventing users from generating certain types of content once users realize it’s possible is that the content already exists in the training data. An AI image generator is only able to produce a nude image because there’s a ton of nudity in its training data. It can only produce the likeness of Taylor Swift because her images are in the training data. And Sora can only make videos of Animal Crossing because there are Animal Crossing gameplay videos in its training data.

For OpenAI to actually stop the copyright infringement it needs to make its Sora 2 model “unlearn” copyrighted content, which is incredibly expensive and complicated. It would require removing all that content from the training data and retraining the model. Even if OpenAI wanted to do that, it probably couldn’t because that content makes Sora function. OpenAI might improve its current moderation to the point where people are no longer able to generate videos of Family Guy, but the Family Guy episodes and other copyrighted content in its training data are still enabling it to produce every other generated video. Even when the generated video isn’t recognizably lifting from someone else’s work, that’s what it’s doing. There’s literally nothing else there. It’s just other people’s stuff.




Il cerchio si stringe attorno a #Zelensky


altrenotizie.org/primo-piano/1…



La strategia di Trump nel caso-Bbc


@Giornalismo e disordine informativo
articolo21.org/2025/11/la-stra…
La cantonata è stata ammessa dallo stesso Tim Davie, direttore generale dimissionario della Bbc: sono stati fatti errori che ci sono costati ma ora li stanno usando come arma. Una settimana prima delle elezioni presidenziali statunitensi del 2024, un prestigioso



La Russia avanza a Pokrovsk: battaglia urbana e ritirate ucraine nel fronte orientale


@Notizie dall'Italia e dal mondo
La conquista della città darebbe al Cremlino una piattaforma operativa per completare il controllo sul Donbass, quasi due anni dopo la caduta di Bakhmut
L'articolo La Russia avanza a Pokrovsk: battaglia urbana e ritirate ucraine nel fronte




Bibliogame Night

farezero.org/2025/gaming_zone/…

Segnalato da Fare Zero Makers Fab Lab e pubblicato sulla comunità Lemmy @GNU/Linux Italia

Scopri il successo di Bibliogame Night, l’evento mensile di giochi da tavolo e ruolo nato nella Biblioteca di Francavilla e ora a Fragagnano. Unisciti alla community, prenota il tuo

GNU/Linux Italia reshared this.



Italia e Germania insieme nel rilancio europeo. Il racconto dalla Festa della Bundeswehr

@Notizie dall'Italia e dal mondo

La Germania e l’Italia possono essere protagoniste del rilancio europeo, a partire dalla cooperazione tra le loro Forze armate. A dirlo è il neo-insediato ambasciatore tedesco in Italia, Thomas Bagger. Alla residenza di Villa Almone, sede



Chiuderli

@Politica interna, europea e internazionale

Ciò che quei garanti garantiscono non è quel che sembrerebbe garantito dalla denominazione, sicché la sola garanzia di serietà che può essere offerta è chiuderli. L’insegna recita: «Garante per la protezione dei dati personali». Quella più in voga è freudianamente anglofona: Authority per la privacy. L’indipendenza di queste Autorità (mica solo questa) è credibile soltanto […]



Il ministro Pichetto Fratin: “Più che transizione ecologica dovremmo chiamarla transizione sociale”


@Politica interna, europea e internazionale
“La transizione in atto, che ogni tanto chiamiamo ecologica, ogni tanto transizione energetica, ogni tanto ambientale è una transizione sociale, che comporta diverse modalità di consumo e determina automaticamente la necessità di nuove competenze”.