Salta al contenuto principale



Ma com'è sta storia che il petrolio scende di prezzo e i carburanti aumentano? 🤨🧐😠


Designing a Simpler Cycloidal Drive


A man's hands are holding an assembly of 3D-printed parts. There is a white backplate, with a yellow circular piece running through the middle. The yellow piece is surrounded by metal rods. Another blue shaft runs through the left side of the assembly. A rougly-diamond shaped plate encompasses both of these shafts.

Cycloidal drives have an entrancing motion, as well as a few other advantages – high torque and efficiency, low backlash, and compactness among them. However, much as [Sergei Mishin] likes them, it can be difficult to 3D-print high-torque drives, and it’s sometimes inconvenient to have the input and output shafts in-line. When, therefore, he came across a video of an industrial three-ring reducing drive, which works on a similar principle, he naturally designed his own 3D-printable drive.

The main issue with 3D-printing a normal cycloidal drive is with the eccentrically-mounted cycloidal plate, since the pins which run through its holes need bearings to keep them from quickly wearing out the plastic plate at high torque. This puts some unfortunate constraints on the size of the drive. A three-ring drive also uses an eccentric drive shaft to cause cycloidal plates to oscillate around a set of pins, but the input and output shafts are offset so that the plates encompass both the pins and the eccentric driveshaft. This simplifies construction significantly, and also makes it possible to add more than one input or output shaft.

As the name indicates, these drives use three plates 120 degrees out of phase with each other; [Sergei] tried a design with only two plates 180 degrees out of phase, but since there was a point at which the plates could rotate just as easily in either direction, it jammed easily. Unlike standard cycloidal gears, these plates use epicycloidal rather than hypocycloidal profiles, since they move around the outside of the pins. [Sergei] helpfully wrote a Python script that can generate profiles, animate them, and export to DXF. The final performance of these drives will depend on their design parameters and printing material, but [Sergei] tested a 20:1 drive and reached a respectable 9.8 Newton-meters before it started skipping.

Even without this design’s advantages, it’s still possible to 3D-print a cycloidal drive, its cousin the harmonic drive, or even more exotic drive configurations.

youtube.com/embed/WMgny-yDjvs?…


hackaday.com/2025/12/11/design…




Amiibo Emulator Becomes Pocket 2.4 GHz Spectrum Analyzer


As technology marches on, gear that once required expensive lab equipment is now showing up in devices you can buy for less than a nice dinner. A case in point: those tiny displays originally sold as Nintendo amiibo emulators. Thanks to [ATC1441], one of these pocket-sized gadgets has been transformed into 2.4 GHz spectrum analyzer.

These emulators are built around the Nordic nRF52832 SoC, the same chip found in tons of low-power Bluetooth devices, and most versions come with either a small LCD or OLED screen plus a coin cell or rechargeable LiPo. Because they all share the same core silicon, [ATC1441]’s hack works across a wide range of models. Don’t expect lab-grade performance; the analyzer only covers the range the Bluetooth chip inside supports. But that’s exactly where Wi-Fi, Bluetooth, Zigbee, and a dozen other protocols fight for bandwidth, so it’s perfect for spotting crowded channels and picking the least congested one.

Flashing the custom firmware is dead simple: put the device into DFU mode, drag over the .zip file, and you’re done. All the files, instructions, and source are up on [ATC1441]’s PixlAnlyzer GitHub repo. Check out some of the other amiibo hacks we’ve featured as well.

youtube.com/embed/kgrsfGIeL9w?…


hackaday.com/2025/12/11/amiibo…



Extremely Rare Electric Piano Restoration


Not only are pianos beautiful musical instruments that have stood the test of many centuries of time, they’re also incredible machines. Unfortunately, all machines wear out over time, which means it’s often not feasible to restore every old piano we might come across. But a few are worth the trouble, and [Emma] had just such a unique machine roll into her shop recently.

What makes this instrument so unique is that it’s among the first electric pianos to be created, and one of only three known of this particular model that survive to the present day. This is a Vivi-Tone Clavier piano which dates to the early 1930s. In an earlier video she discusses more details of its inner workings, but essentially it uses electromagnetic pickups like a guitar to detect vibrations in plucked metal reeds.

To begin the restoration, [Emma] removes the action and then lifts out all of the keys from the key bed. This instrument is almost a century old so it was quite dirty and needed to be cleaned. The key pins are lubricated, then the keys are adjusted so that they all return after being pressed. From there the keys are all adjusted so that they are square and even with each other. With the keys mostly in order, her attention turns to the action where all of the plucking mechanisms can be filed, and other adjustments made. The last step was perhaps the most tedious, which is “tuning” the piano by adjusting the pluckers so that all of the keys produce a similar amount or volume of sound, and then adding some solder to the reeds that were slightly out of tune.

With all of those steps completed, the piano is back in working order, although [Emma] notes that since these machines were so rare and produced so long ago there’s no real way to know if the restoration sounds like what it would have when it was new. This is actually a similar problem we’ve seen before on this build that hoped to model the sound of another electric instrument from this era called the Luminaphone.

youtube.com/embed/cEG7hD28dW4?…

Thanks to [Eluke] for the tip!


hackaday.com/2025/12/11/extrem…

Andre123 🐧 reshared this.



CSRA: Perché serve un nuovo modo di percepire ciò che non riusciamo più a controllare


La cybersecurity vive oggi in una contraddizione quasi paradossale: più aumentano i dati, più diminuisce la nostra capacità di capire cosa sta accadendo. I SOC traboccano di log, alert, metriche e pannelli di controllo, eppure gli attacchi più gravi — dai ransomware alle campagne stealth di spionaggio — continuano a sfuggire alla vista proprio nel momento decisivo: quando tutto sta per cominciare.

Il problema non è l’informazione. Il problema è lo sguardo: la capacità di visualizzare ciò che conta!

Esistono strumenti perfetti per contare, classificare, correlare; molti meno per percepire.

Così, mentre la superficie digitale cresce in complessità e velocità, continuiamo a osservare il cyberspace come un inventario di oggetti — server, IP, pacchetti — quando in realtà è un ambiente vivo, dinamico, pulsante, fatto di relazioni che cambiano forma.

Per provare a cambiare le cose nasce il Cyber Situational-Relational Awareness (CSRA): un modello che mette al centro la percezione.

1. Il vero problema non è tecnico: è percettivo.


Viviamo in un ecosistema digitale dove tutto produce segnali. Ogni servizio, applicazione, sensore, utente, processo automatico lascia una o più tracce. Non c’è mai stata così tanta “visibilità” a disposizione dei difensori. Eppure il paradosso persiste: gli attacchi vanno a segno, gli indicatori non bastano, la complessità ci sovrasta.

Il motivo è semplice: abbiamo un’enorme quantità di dati e di informazioni, ma pochissima consapevolezza del loro significato nel momento in cui cambia.

Gli strumenti tradizionali ci dicono cosa è successo, a volte cosa sta succedendo al momento, quasi mai cosa sta per accadere.
Manca la percezione del mutamento, di quella variazione sottile che precede l’incidente.

Il CSRA, concettualmente, nasce proprio per cogliere queste trasformazioni minime, che oggi si perdono nei rumori di fondo.

2. Il cyberspace non è un inventario di oggetti, ma un ecosistema di relazioni


Per trent’anni abbiamo sentito descrivere il cyberspace come un insieme di entità isolate: host, server, IP, router. Abbiamo costruito strumenti pensati per monitorare questi oggetti, ciascuno con i propri attributi e comportamenti misurabili. Ma la realtà degli attacchi moderni mostra un quadro completamente diverso.

Quando una minaccia si manifesta, non è l’oggetto a tradirla, ma la relazione tra oggetti.
Non è il server anomalo a dirci che sta succedendo qualcosa: è il modo in cui sta comunicando con altri nodi.
Non è un singolo pacchetto strano: è il ritmo delle sue interazioni.
Non è un evento isolato: è il cambiamento di una costellazione di micro-eventi.

Ecco la prima grande intuizione del CSRA: il nodo cyber non è un dispositivo, ma un piccolo ecosistema composto da un’entità — umana o automatica — e dalla tecnologia che usa per comunicare. Per comprenderlo occorre osservare come evolve nel tempo, non cosa è staticamente.

3. Comprendere un attacco significa ascoltare il ritmo della rete.


Ogni rete possiede un suo proprio ritmo: qualcuna presenta un alternarsi di picchi e quiete, altre una regolarità nelle connessioni, e poi ci sono le reti di lavoro con un andamento che si ripete giorno dopo giorno.
È proprio quando questo ritmo naturale si spezza — anche in maniera quasi impercettibile — che qualcosa comincia a muoversi.

Il CSRA si concentra su questo: sulla capacità di percepire un cambiamento di ritmo prima che diventi un incidente conclamato. Naturalmente non ogni deviazione implica un attacco: a volte si tratta di un malfunzionamento o di un cambio di abitudini. Ma è sempre meglio verificare.

Un attacco nelle prime fasi è quasi invisibile. Modifica una sequenza di azioni, altera un’abitudine, crea una piccola vibrazione nella rete. Una procedura automatica che diventa più attiva del solito; un nodo che stabilisce collegamenti imprevisti; un cluster che sembra muoversi in modo più irrequieto.

Queste vibrazioni sono i segnali precoci dell’incidente. Il CSRA è progettato per ascoltarli.

4. Lo “spazio locale”: dove la rete ci dice di guardare.


La rete è troppo vasta per essere osservata tutta allo stesso modo.
E qui nasce la seconda intuizione del CSRA: non tutto merita attenzione, almeno non nello stesso momento. Ogni trasformazione significativa parte da un punto preciso della rete. È lì, in quella piccola regione, che il ritmo si altera. Il CSRA identifica questa regione emergente e la trasforma in un “spazio locale”: una sorta di lente dinamica che si concentra proprio dove sta avvenendo il cambiamento.

Lo spazio locale non è predefinito: viene generato dalla rete stessa. È lei a segnalare dove posare lo sguardo. È questo meccanismo che permette a un sistema CSRA di non affogare nei dati e, allo stesso tempo, di accorgersi dei segnali giusti nel momento giusto.

5. La rete come paesaggio: quando ciò che era invisibile diventa evidente


Uno dei punti più affascinanti del CSRA è la sua capacità di trasformare la rete in un paesaggio visivo. Non una dashboard piena di numeri, ma una rappresentazione quasi geografica delle attività: alture che indicano intensità, valli che rivelano stabilità, creste che segnalano turbolenze.

Per la prima volta, l’analista può “vedere” l’incidente come si vede una perturbazione meteorologica: una zona che si scalda, si deforma, si muove. È un modo più naturale, quasi intuitivo, di percepire il cyberspace, che consente di cogliere immediatamente ciò che non torna, anche senza sapere in anticipo di cosa si tratti.

Questa rappresentazione non è un vezzo grafico: è una forma di consapevolezza.

Ciò che era nascosto diventa visibile.

6. Perché il CSRA potenzialmente potrebbe vedere ciò che gli altri strumenti non vedono.


La ragione è semplice e, allo stesso tempo, rivoluzionaria: il CSRA non cerca ciò che conosce, osserva ciò che cambia. Gli strumenti basati su firme, regole e pattern riconoscono solo ciò che è già stato codificato. Funzionano benissimo contro minacce note, molto meno contro tecniche nuove, attacchi creativi o comportamenti deliberatamente irregolari.

Il CSRA, invece, affronta il cyberspace come un organismo in continuo mutamento.
Quando un nodo inizia a comportarsi in modo inusuale, quando due sistemi improvvisano un dialogo imprevisto, quando una parte della rete si anima in modo anomalo, il CSRA lo percepisce immediatamente.

È un’attenzione simile a quella umana: istintiva, sensibile al movimento, orientata alla variazione. Dietro questa capacità percettiva c’è una matematica precisa: quella delle variazioni, dell’entropia e dei cambiamenti tra nodi connessi. Non servono formule per capirlo: conta il principio, quello di misurare come la rete si trasforma nel tempo.

7. Il CSRA è prima di tutto un nuovo modo di pensare.


Non è un software da aggiungere, né un modulo da integrare. È una nuova mentalità per affrontare la sicurezza in un mondo che cambia troppo velocemente. Il CSRA porta con sé un messaggio chiaro: non possiamo più limitarci a raccogliere dati. Dobbiamo imparare a percepire le trasformazioni.

Una rete osservata con il CSRA non è una collezione di oggetti tecnici, ma un ambiente vivo. Il SOC smette di essere un centro di allarmi e diventa un luogo di interpretazione, in cui la difesa non è una reazione tardiva ma un esercizio continuo di comprensione.

Conclusione: il CSRA è la percezione cyber del XXI secolo.


Il CSRA non introduce un altro strumento nell’infinita collezione già esistente. Introduce qualcosa di più importante: un nuovo modo di guardare il cyberspace.

Non come un elenco di entità isolate, ma come un tessuto di relazioni che respira, cambia e ci parla — se sappiamo ascoltarlo.

In un’epoca in cui gli attacchi si trasformano più rapidamente dei nostri modelli di difesa, percepire il cambiamento diventa una necessità strategica. E il CSRA rappresenta il primo passo verso questa nuova forma di consapevolezza.

Non è solo tecnologia. È una nuova capacità umana: vedere ciò che prima era invisibile.

L'articolo CSRA: Perché serve un nuovo modo di percepire ciò che non riusciamo più a controllare proviene da Red Hot Cyber.



Papa Leone XIV ha ricevuto stamattina il presidente della Conferenza episcopale polacca mons. Tadeusz Wojda, il vicepresidente mons. Jozef Kupny e il segretario generale mons. Marek Marczak.


Journalists warn of silenced sources


From national outlets to college newspapers, reporters are running into the same troubling trend: sources who are afraid to speak to journalists because they worry about retaliation from the federal government.

This fear, and how journalists can respond to it, was the focus of a recent panel discussion hosted by Freedom of the Press Foundation (FPF), the Association of Health Care Journalists, and the Society of Environmental Journalists. Reporters from a range of beats described how the second Trump administration has changed the way people talk to the press, and what journalists do to reassure sources and keep them safe.

youtube.com/embed/rIyRDQFEl4k?…

For journalist Grace Hussain, a solutions correspondent at Sentient Media, this shift became unmistakable when sources who relied on federal funding suddenly backed out of participating in her reporting. “Their concerns were very legitimate,” Hussain said, “It was possible that their funding could get retracted or withdrawn” for speaking to the press.

When Hussain reached out to other reporters, she found that sources’ reluctance to speak to the press for fear of federal retaliation is an increasingly widespread issue that’s already harming news coverage. “There are a lot of stories that are under-covered, and it’s just getting more difficult at this point to do that sort of coverage with the climate that we’re in,” she said.

Lizzy Lawrence, who covers the Food and Drug Administration for Stat, has seen a different but equally unsettling pattern. Lawrence has found that more government sources want to talk about what’s happening in their agencies, but often only if they’re not named. Since Trump returned to office, she said, many sources “would request only to speak on the condition of anonymity, because of fears of being fired.” As a result, her newsroom is relying more on confidential sources, with strict guardrails, like requiring multiple sources to corroborate information.

For ProPublica reporter Sharon Lerner, who’s covered health and the environment across multiple administrations, the heightened fear is impossible to miss. Some longtime sources have cut off communication with her, including one who told her they were falsely suspected of leaking.

And yet, she added, speaking to the press may be one of the last options left for employees trying to expose wrongdoing. “So many of the avenues for federal employees to seek justice or address retaliation have been shut down,” Lerner said.

This chilling effect extends beyond federal agencies. Emily Spatz, editor-in-chief of Northeastern’s independent student newspaper The Huntington News, described how fear spread among international students after federal agents detained Mahmoud Kahlil and Rümeysa Öztürk. Visa revocations of students at Northeastern only deepened the concern.

Students started asking the newspaper to take down previously published op-eds they worried could put them at risk, a step Spatz took after careful consideration. The newsroom ultimately removed six op-eds but posted a public website documenting each removal to preserve transparency.

Even as the paper worked hard to protect sources, many became reluctant to participate in their reporting. One student, for instance, insisted the newspaper remove a photo showing the back of their head, a method the paper had used specifically to avoid identifying sources.

Harlo Holmes, the chief information security officer and director of digital security at FPF, said these patterns mirror what journalists usually experience under authoritarian regimes, but — until now — have not been seen in the United States. Whistleblowing is a “humongously heroic act,” Holmes said, “and it is not always without its repercussions.”

She urged reporters to adopt rigorous threat-modeling practices and to be transparent with sources about the tools and techniques they use to keep them safe. Whether using SecureDrop, Signal, or other encrypted channels, she said journalists should make it easy for sources to find out how to contact them securely. “A little bit of education goes a long way,” she said.

For more on how journalists are working harder than ever to protect vulnerable sources, watch the full event recording here.


freedom.press/issues/journalis…



Covering immigration in a climate of fear


As the federal government ramps up immigration enforcement, sweeping through cities, detaining citizens and noncitizens, separating families, and carrying out deportations, journalists covering immigration have had to step up their work, too.

Journalists on the immigration beat today are tasked with everything from uncovering government falsehoods to figuring out what their communities need to know and protecting their sources. Recently, Freedom of the Press Foundation (FPF) hosted a conversation with journalists Maritza Félix, the founder and director of Conecta Arizona; Arelis Hernández, a reporter for The Washington Post; and Lam Thuy Vo, an investigative reporter with Documented. They discussed the challenges they face and shared how they report on immigration with humanity and accuracy, while keeping their sources and themselves safe.

youtube.com/embed/OPPo0YzKfnA?…

Immigration reporting has grown a lot more difficult, explained Hernández, as sources increasingly fear retaliation from the government. “I spend a lot of time at the front end explaining, ‘Where will this go? What will it look like?’” Hernández said, describing her process of working with sources to ensure they participate in reporting knowingly and safely. She also outlined her own precautions, from using encrypted devices to carrying protective gear, highlighting just how unsafe conditions have become, even for U.S.-born reporters.

Like Hernández, Félix also emphasized the intense fear and uncertainty many immigrant sources experience. Other sources, however, may be unaware of the possible consequences of speaking to reporters and need to be protected as well. “I think when we’re talking about sources, particularly with immigration, we’re talking about people who are sharing their most vulnerable moments in their life, and I think the way that we treat it is going to be very decisive on their future,” she said.

Journalists who are themselves immigrants must also manage personal risk, Félix said, “but the risk is always going to be there just because of who we are and what we represent in this country.” She pointed to the arrest and deportation of journalist Mario Guevara in Georgia, saying it “made me think that could have been me” before she became a U.S. citizen. She recommended that newsrooms provide security training, mental health resources, and operational protocols for both staff and freelancers.

Both Félix and Vo, who work in newsrooms by and for immigrant communities, emphasized the need for journalists to actively listen to the people they cover. “If you’re trying to serve immigrants, build a listening mechanism, some kind of way of continuing to listen to both leaders in the community, service providers, but also community members,” Vo advised. She also recommended that journalists use risk assessments and threat modeling to plan how to protect themselves and their sources.

Watch the full discussion here.


freedom.press/issues/covering-…



Tempesta e freddo su 850mila sfollati vittime dello stato genocida di israele.
Rahaf, bimba di otto mesi, morta di freddo a Kahn Younis
differx.noblogs.org/2025/12/11…

#Gaza #genocidio #israhell #tempesta #tempestabyron

reshared this





‘Architects of AI’ Wins Time Person of the Year, Sends Gambling Markets Into a Meltdown#TimePersonoftheYear


‘Architects of AI’ Wins Time Person of the Year, Sends Gambling Markets Into a Meltdown


The degenerate gamblers of Polymarket and Kalshi who bet that “AI” would win the Time Person of the Year are upset because the magazine has named the “Architects of AI” the person of the year. The people who make AI tools and AI infrastructure are, notably, not “AI” themselves, and thus both Kalshi and Polymarket have decided that people who bet “AI” do not win the bet. On Polymarket alone, people spent more than $6 million betting on AI gracing the cover of Time.

As writer Parker Molloy pointed out, people who bet on AI are pissed. “ITS THE ARCHITECTS OF AI THISNIS [sic] LITERALLY THE BET FUCK KALSHI,” one Kalshi better said.

“This pretty clearly should’ve resolved to yes. If you bought AI, reach out to Kalshi support because ‘AI’ is literally on the cover and in the title ‘Architects of AI.’ They’re not going to change anything unless they hear from people,” said another.

“ThE aRcHiTeCtS oF AI fuck you pay me,” said a third.

“Another misleading bet by Kalshi,” said another gambler. “Polymarket had fair rules and Kalshi did not. They need to fix this.”

But bag holders on Polymarket are also pissed. “This is a scam. It should be resolved to a cancellation and a full refund to everyone,” said a gambler who’d put money down on Jensen Huang and lost. Notably, on Kalshi, anyone who bet on any of the “Architects of AI,” won the bet (meaning Sam Altman, Elon Musk, Jensen Huang, Dario Amodei, Mark Zuckerberg, Lisa Su, and Demis Hassabis), while anyone who bet their products—“ChatGPT” and “OpenAI” did not win. On Polymarket, the rules were even more strict, i.e. people who bet “Jensen Huang” lost but people who bet “Other” won.

“FUCK YOU FUCKING FUCK Shayne Coplan [CEO of Polymarket],” said someone who lost about $50 betting on AI to make the cover.

Polymarket made its reasoning clear in a note of “additional context” on the market.

“This market is about the person/thing named as TIME's Person of the Year for 2025, not what is depicted on the cover. Per the rules, “If the Person of the Year is ‘Donald Trump and the MAGA movement,’ this would qualify to resolve this market to ‘Trump.’ However if the Person of the Year is ‘The MAGA movement,’ this would not qualify to resolve this market to ‘Trump’ regardless of whether Trump is depicted on the cover,” it said.

“Accordingly, a Time cover which lists ‘Architects of AI’ as the person of the year will not qualify for ‘AI’ even if the letters ‘AI’ are depicted on the cover, as AI itself is not specifically named.”

It should be noted how incredibly stupid all of this is, which is perhaps appropriate for the year 2025, in which most of the economy consists of reckless gambling on AI. People spent more than $55 million betting on the Time Person of the Year on Polymarket, and more than $19 million betting on the Time Person of the Year on Kalshi. It also presents one of the many downsides of spending money to bet on random things that happen in the world. One of the most common and dumbest things that people continue to do to this day despite much urging otherwise is anthropomorphize AI, which is distinctly not a person and is not sentient.

Time almost always actually picks a “person” for its Person of the Year cover, but it does sometimes get conceptual with it, at times selecting groups of people (“The Silence Breakers” of the #MeToo movement, the “Whistleblowers,” the “Good Samaritans,” “You,” and the “Ebola Fighters,” for example). In 1982 it selected “The Computer” as its “Machine of the Year,” and in 1988 it selected “The Endangered Earth” as “Planet of the Year.”

Polymarket’s users have been upset several times over the resolution of bets in the past few weeks and their concerns highlight how easy it is to manipulate the system. In November, an unauthorized edit of a live map of the Ukraine War allowed gamblers to cash in on a battle that hadn’t happened. Earlier this month, a trader made $1 million in 24 hours betting on the results of Google’s 2025 Year In Search Rankings and other users accused him of having inside knowledge of the process. Over the summer, Polymarket fought a war over whether or not President Zelenskyy had worn a suit. Surely all of this will continue to go well and be totally normal moving forward, especially as these prediction markets begin to integrate themselves with places such as CNN.




With OpenAI investment, Disney will officially begin putting AI slop into its flagship streaming product.#AIPorn #OpenAI #Disney


Disney Invests $1 Billion in the AI Slopification of Its Brand


The first thing I saw this morning when I opened X was an AI-generated trailer for Avengers: Doomsday. Robert Downey Jr’s Doctor Doom stood in a shapeless void alongside Captain America and Reed Richards. It was obvious slop but it was also close in tone and feel of the last five years of Disney’s Marvel movies. As media empires consolidate, nostalgia intensifies, and AI tools spread, Disney’s blockbusters feel more like an excuse to slam recognizable characters together in a contextless morass.

So of course Disney has announced it signed a deal with OpenAI today that will soon allow fans to make their own officially licensed Disney slop using Sora 2. The house that mouse built, and which has been notoriously protective of its intellectual property, opened up the video generator, saw the videos featuring Nazi Spongebob and criminal Pikachu, and decided: We want in.

According to a press release, the deal is a 3 year licensing agreement that will allow the AI company’s short form video platform Sora to generate slop videos using characters like Mickey Mouse and Iron Man. As part of the agreement, Disney is investing $1 billion of equity into OpenAI, said it will become a major customer of the company, and promised that fan and corporate AI-generated content would soon come to Disney+, meaning that Disney will officially begin putting AI slop into its flagship streaming product.

The deal extends to ChatGPT as well and, starting in early 2026, users will be able to crank out officially approved Disney slop on multiple platforms. When Sora 2 launched in October, it had little to no content moderation or copyright guidelines and videos of famous franchise characters doing horrible things flooded the platform. Pikachu stole diapers from a CVS, Rick and Morty pushed crypto currencies, and Disney characters shouted slurs in the aisles of Wal-Mart.

It is worth mentioning that, although Disney has traditionally been extremely protective of its intellectual property, the company’s princesses have become one of the most common fictional subjects of AI porn on the internet; 404 Media has found at least three different large subreddits dedicated to making AI porn of characters like Elsa, Snow White, Rapunzel, and Tinkerbell. In this case, Disney is fundamentally throwing its clout behind a technology that has thus far most commonly been used to make porn of its iconic characters.

After the hype of the launch, OpenAI added an “opt-in” policy to Sora that was meant to prevent users from violating the rights of copyright holders. It’s trivial to break this policy however, and circumvent the guardrails preventing a user from making a lewd Mickey Mouse cartoon or episode of The Simpsons. The original sin of Sora and other AI systems is that the training data is full of copyrighted material and the models cannot be retrained without great cost, if at all.

If you can’t beat the slop, become the slop.

“The rapid advancement of artificial intelligence marks an important moment for our industry, and through this collaboration with OpenAI we will thoughtfully and responsibly extend the reach of our storytelling through generative AI, while respecting and protecting creators and their works,” Bob Iger, CEO of Disney, said in the press release about the agreement.

The press release explained that Sora users will soon have “official” access to 200 characters in the Disney stable, including Loki, Thanos, Darth Vader, and Minnie Mouse. In exchange, Disney will begin to use OpenAI’s APIs to “build new products” and it will deploy “ChatGPT for its employees.”

I’m imagining a future where AI-generated fan trailers of famous characters standing next to each other in banal liminal spaces is the norm. People have used Sora 2 to generate some truly horrifying videos, but the guardrails have become more aggressive. As Disney enters the picture, I imagine the platform will become even more anodyne. Persistent people will slip through and generate videos of Goofy and Iron Man sucking and fucking, sure, but the vast majority of what’s coming will be safe corporate gruel that resembles a Marvel movie.




Il Portogallo paralizzato dal primo sciopero generale dopo 12 anni


@Notizie dall'Italia e dal mondo
I sindacati portoghesi hanno proclamato lo sciopero contro un piano del governo che faciliterà i licenziamenti ed estenderà la precarietà nel mondo del lavoro
L'articolohttps://pagineesteri.it/2025/12/11/europa/il-portogallo-paralizzato-dal-primo-sciopero-generale-dopo-12-anni/






Jenny’s Daily Drivers: Haiku R1/beta5


Back in the mid 1990s, the release of Microsoft’s Windows 95 operating system cemented the Redmond software company’s dominance over most of the desktop operating system space. Apple were still in their period in the doldrums waiting for Steve Jobs to return with his NeXT, while other would-be challengers such as IBM’s OS/2 or Commodore’s Amiga were sinking into obscurity.

Into this unpromising marketplace came Be inc, with their BeBox computer and its very nice BeOS operating system. To try it out as we did at a trade show some time in the late ’90s was to step into a very polished multitasking multimedia OS, but sadly one which failed to gather sufficient traction to survive. The story ended in the early 2000s as Be were swallowed by Palm, and a dedicated band of BeOS enthusiasts set about implementing a free successor OS. This has become Haiku, and while it’s not BeOS it retains API compatibility with and certainly feels a lot like its inspiration. It’s been on my list for a Daily Drivers article for a while now, so it’s time to download the ISO and give it a go. I’m using the AMD64 version.

A Joy To Use, After A Few Snags

Hackaday, in WebPositive, on HaikuIf you ignore the odd font substitution in WebPositive, it’s a competent browser.
This isn’t the first time I’ve given Haiku a go in an attempt to write about it for this series, and I have found it consistently isn’t happy with my array of crusty old test laptops. So this time I pulled out something newer, my spare Lenovo Thinkpad X280. I was pleased to see that the Haiku installation USB volume booted and ran fine on this machine, and I was soon at the end of the install and ready to start my Haiku journey.

Here I hit my first snag, because sadly the OS hadn’t quite managed to set up its UEFI booting correctly. I thus found myself unexpectedly in a GRUB prompt, as the open source bootloader was left in place from a previous Linux install. Fixing this wasn’t too onerous as I was able to copy the relevant Haiku file to my UEFI partition, but it was a little unexpected. On with the show then, and in to Haiku.

In use, this operating system is a joy. Its desktop look and feel is polished, in a late-90s sense. There was nothing jarring or unintuitive, and though I had never used Haiku before I was never left searching for what I needed. It feels stable too, I was expecting the occasional crash or freeze, but none came. When I had to use the terminal to move the UEFI file it felt familiar to me as a Linux user, and all my settings were easy to get right.

Never Mind My Network Card

The Haiku network setup dialogIf only the network setup on my Thinkpad was as nice as the one in the VM.
I hit a problem when it came to network setup though, I found its wireless networking to be intermittent. I could connect to my network, but while DHCP would give it an IP address it failed to pick up the gateway and thus wasn’t a useful external connection. I could fix this by going to a fixed IP address and entering the gateway and DNS myself, and that gave me a connection, but not a reliable one. I would have it for a minute or two, and then it would be gone. Enough time for a quick software update and to load Hackaday on its WebPositive web browser, but not enough time to do any work. We’re tantalisingly close to a useful OS here, and I don’t want this review to end on that note.

The point of this series has been to try each OS in as real a situation as possible, to do my everyday Hackaday work of writing articles and manipulating graphics. I have used real hardware to achieve this, a motley array of older PCs and laptops. As I’ve described in previous paragraphs I’ve reached the limits of what I can do on real hardware due to the network issue, but I still want to give this one a fair evaluation. I have thus here for the first time used a test subject in a VM rather than on real hardware. What follows then is courtesy of Gnome Boxes on my everyday Linux powerhouse, so please excuse the obvious VM screenshots.

This One Is A True Daily Driver

The HaikuDepot software library.There’s plenty of well-ported software, but nothing too esoteric.
With a Haiku install having a working network connection, it becomes an easy task to install software updates, and install new software. The library has fairly up-to-date versions of many popular packages, so I was easily able to install GIMP and LibreOffice. WebPositive is WebKit-based and up-to-date enough that the normally-picky Hackaday back-end doesn’t complain at me, so it more than fulfils my Daily Drivers requirement for an everyday OS I can do my work on. In fact, the ’90s look-and-feel and the Wi-Fi issues notwithstanding, this OS feels stable and solid in a way that many of the other minority OSes I’ve tried do not. I could use this day-to-day, and the Haiku Thinkpad could accompany me on the road.

There is a snag though, and it’s not the fault of the Haiku folks but probably a function of the size of their community; this is a really great OS, but sadly there are software packages it simply doesn’t have available for it. They’ve concentrated on multimedia, the web, games, and productivity in their choice of software to port, and some of the more esoteric or engineering-specific stuff I use is unsurprisingly not there. I can not fault them for this given the obvious work that’s gone into this OS, but it’s something to consider if your needs are complex.

Haiku then, it’s a very nice desktop operating system that’s polished, stable, and a joy to use. Excuse it a few setup issues and take care to ensure your Wi-Fi card is on its nice list, and you can use it day-to-day. It will always have something of the late ’90s about it, but think of that as not a curse but the operating system some of us wished we could have back in the real late ’90s. I’ll be finding a machine to hang onto a Haiku install, this one bears further experimentation.


hackaday.com/2025/12/11/jennys…



"Promuovere una cultura dell’infanzia fondata sul rispetto, sulla dignità e sulla responsabilità nell’uso delle nuove tecnologie, favorendo un dialogo costruttivo tra i diversi attori della società contemporanea".


Papa Leone XIV ha ricevuto stamattina il presidente della Conferenza episcopale polacca mons. Tadeusz Wojda, il vicepresidente mons. Jozef Kupny e il segretario generale mons. Marek Marczak.


Gelosia 2.0


C’è stato un tempo in cui la gelosia si misurava in sguardi di troppo, in telefonate misteriose o in ritardi sospetti. Oggi invece basta un click, o meglio, un like. La gelosia non ha più bisogno di biglietti profumati trovati in una tasca, ma di una notifica sullo schermo. Benvenuti nell’era delle gelosie 2.0, dove un cuore rosso lasciato sotto una foto può scatenare più discussioni di una cena mancata.
noblogo.org/lalchimistadigital…



Dozens of government websites have fallen victim to a PDF-based SEO scam, while others have been hijacked to sell sex toys.#AI


Porn Is Being Injected Into Government Websites Via Malicious PDFs


Dozens of government and university websites belonging to cities, towns, and public agencies across the country are hosting PDFs promoting AI porn apps, porn sites, and cryptocurrency scams; dozens more have been hit with a website redirection attacks which lead to animal vagina sex toy ecommerce pages, penis enlargement treatments, automatically-downloading Windows program files, and porn.

“Sex xxx video sexy Xvideo bf porn XXX xnxx Sex XXX porn XXX blue film Sex Video xxx sex videos Porn Hub XVideos XXX sexy bf videos blue film Videos Oficial on Instagram New Viral Video The latest original video has taken the internet by storm and left viewers in on various social media platforms ex Videos Hot Sex Video Hot Porn viral video,” reads the beginning of a three-page PDF uploaded to the website of the Irvington, New Jersey city government’s website.

The PDF, called “XnXX Video teachers fucking students Video porn Videos free XXX Hamster XnXX com” is unlike many of the other PDFs hosted on the city’s website, which include things like “2025-10-14 Council Minutes,” “Proposed Agenda 9-22-25,” and “Landlord Registration Form (1 & 2 unit dwelling).”

It is similar, however, to another PDF called “30 Best question here’s,” which looks like this:

Irvington, which is just west of Newark and has a population of 61,000 people, has fallen victim to an SEO spam attack that has afflicted local and state governments and universities around the United States.

💡
Do you know anything else about whatever is going on here? I would love to hear from you. Using a non-work device, you can message me securely on Signal at jason.404. Otherwise, send me an email at jason@404media.co.

Researcher Brian Penny has identified dozens of government and university websites that hosted PDF guides for how to make AI porn, PDFs linking to porn videos, bizarre crypto spam, sex toys, and more.

Reginfo.gov, a regulatory affairs compliance website under the federal government’s General Services Administration, is currently hosting a 12 page PDF called “Nudify AI Free, No Sign-Up Needed!,” which is an ad and link to an abusive AI app designed to remove a person’s clothes. The Kansas Attorney General’s office and the Mojave Desert Air Quality Management District Office in California hosted PDFs called “DeepNude AI Best Deepnude AI APP 2025.” Penny found similar PDFs on the websites for the Washington Department of Fish and Wildlife, the Washington Fire Commissioners Association, the Florida Department of Agriculture, the cities of Jackson, Mississippi and Massillon, Ohio, various universities throughout the country, and dozens of others. Penny has caught the attention of local news throughout the United States, who have reported on the problem.

The issue appears to be stemming from websites that allow people to upload their own PDFs, which then sit on these government websites. Because they are loaded with keywords for widely searched terms and exist on government and university sites with high search authority, Google and other search engines begin to surface them. In the last week or so, many (but not all) of the PDFs Penny has discovered have been deleted by local governments and universities.

But cities seem like they are having more trouble cleaning up another attack, which is redirecting traffic from government URLs to porn, e-commerce, and spam sites. In an attack that seems similar to what we reported in June, various government websites are somehow being used to maliciously send traffic elsewhere. For example, the New York State Museum’s online exhibit for something called “The Family Room” now has at least 11 links to different types of “realistic” animal vagina pocket masturbators, which include “Zebra Animal Vagina Pussy Male Masturbation Cup — Pocket Realistic Silicone Penis Sex Toy ($27.99),” and “Must-have Horse Pussy Torso Buttocks Male Masturbator — Fantasy Realistic Animal Pussie Sex Doll.”

Links Penny found on Knoxville, Tennessee’s site for permitting inspections first go to a page that looks like a government site for hosting files then redirects to a page selling penis growth supplements that features erect penises (human penises, mercifully), blowjobs, men masturbating, and Dr. Oz’s face.

Another Knoxville link I found, which purports to be a pirated version of the 2002 Vin Diesel film XXX simply downloaded a .exe file to my computer.

Penny believes that what he has found is basically the tip of the iceberg, because he is largely finding these by typing things like “nudify site:.gov” “xxx site:.gov” into Google and clicking around. Sometimes, malicious pages surface only on image searches or video searches: “Basically the craziest things you can think of will show up as long as you’re on image search,” Penny told 404 Media. “I’ll be doing this all week.”

The Nevada Department of Transportation told 404 Media that “This incident was not related to NDOT infrastructure or information systems, and the material was not hosted on NDOT servers.This unfortunate incident was a result of malicious use of a legitimate form created using the third-party platform on which NDOT’s website is hosted. NDOT expeditiously worked with our web hosting vendor to ensure the inappropriate content was removed.” It added that the third-party is Granicus, a massive government services company that provides website backend infrastructure for many cities and states around the country, as well as helps them stream and archive city council meetings, among other services. Several of the affected local governments use Granicus, but not all of them do; Granicus did not respond to two requests for comment from 404 Media.

The California Secretary of State’s Office told 404 Media: “A bad actor uploaded non-business documents to the bizfile Online system (a portal for business filings and information). The files were then used in external links allowing public access to only those uploaded files. No data was compromised. SOS staff took immediate action to remove the ability to use the system for non-SOS business purposes and are removing the unauthorized files from the system.” The Washington Department of Fish and Wildlife said “WDFW is aware of this issue and is actively working with our partners at WaTech to address it.” The other government agencies mentioned in this article did not respond to our requests for comment.


#ai


The discovery of fire-cracked handaxes and sparking tools in southern Britain pushes the timeline of controlled fires back 350,000 years.#TheAbstract


Scientists Discover the Earliest Human-Made Fire, Rewriting Evolutionary History


🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.

Humans made fires as early as 400,000 years ago, pushing the timeline of this crucial human innovation back a staggering 350,000 years, reports a study published on Wednesday in Nature.

Mastery of fire is one of the most significant milestones in our evolutionary history, enabling early humans to cook nutritious food, seek protection from predators, and establish comfortable spaces for social gatherings. The ability to make fires is completely unique to the Homo genus that includes modern humans (Homo sapiens) and extinct humans, including Neanderthals.

Early humans may have opportunistically exploited wildfires more than one million years ago, but the oldest known controlled fires, which were intentionally lit with specialized tools, were previously dated back to about 50,000 years ago at Neanderthal sites in France.

Now, archaeologists have unearthed the remains of campfires ignited by an unidentified group of humans 400,000 years ago at Barnham, a village near the southern coast of the United Kingdom.

“This is a 400,000-year-old site where we have the earliest evidence of making fire—not just in Britain or Europe, but in fact, anywhere else in the world,” said Nick Ashton, an archaeologist at the British Museum who co-authored the study, in a press briefing held on Tuesday.

“Many of the great turning points in human development, and the development of our civilization, depended on fire,” added co-author Rob Davis, also an archaeologist at the British Museum. “We're a species who have used fire to really shape the world around us—in belief systems, as well. It's a very prominent part of belief systems across the world.”

Artifacts have been recovered from Barnham for more than a century, but the remnants of this ancient hearth were identified within the past decade. The researchers were initially tipped off by the remains of heated clay sediments, hydrocarbons associated with fire, and fire-cracked flint handaxes.

But the real smoking gun was the discovery of two small fragments of iron pyrite, a mineral commonly used to strike flint to produce sparks at later prehistoric campfires such as the French Neanderthal sites.
Discovery of the first fragment of iron pyrite in 2017 at Barnham, Suffolk Image: Jordan Mansfield, Pathways to Ancient Britain Project.
“Iron pyrite is a naturally occurring mineral, but through geological work in the area over the last 36 years, looking at 26 sites, we argue that pyrite is incredibly rare in the area,” said Ashton. “We think humans brought pyrite to the site with the intention of making fire.”

The fire-starters were probably Neanderthals, who were known to be present in the region at the time thanks to a skull found in Swanscombe, about 80 miles northeast of Barnham. But it’s possible that the fires were made by another human lineage such as Homo heidelbergensis, which also left bones in the U.K. around the same period. It was not Homo sapiens as our lineage emerged in Africa later, about 300,000 years ago.

Regardless of this group’s identity, its ability to make fire would have been a major advantage, especially in the relatively cold environment of southern Britain at the time. It also hints that the ability to make fire extends far deeper into the past than previously known.

“We assume that the people who made the fire at Barnham brought the knowledge with them from continental Europe,” said co-author Chris Stringer, a physical anthropologist at the Natural History Museum. “There was a land bridge there. There had been a major cold stage about 450,000 years ago, which had probably wiped out everyone in Britain. Britain had to be repopulated all over again.”

“Having that use of fire, which they must have brought with them when they came into Britain, would have helped them colonize this new area and move a bit further north to places where the winters are going to be colder,” he continued. “You can keep warm. You can keep wild animals away. You get more nutrition from your food.”
Excavation of the ancient campfire, removing diagonally opposed quadrants. The reddened sediment between band B’ is heated clay. Image: Jordan Mansfield, Pathways to Ancient Britain Project.
Although these humans likely had brains close in size to our own, the innovation of controlled fire would have amplified their cognitive development, social bonds, and symbolic capacities. In the flickering light of ancient campfires, these humans shared food, protection, and company, passing on a tradition that fundamentally reshaped our evolutionary trajectory.

“People were sitting around the fires, sharing information, having extra time beyond pure daylight to make things, to teach things, to communicate with each other, to tell stories,” Stringer said. “Maybe it may have even fueled the development of language.”

“We've got this crucial aspect in human evolution, and we can put a marker down that it was there 400,000 years ago,” he concluded.




e poi ditemi che quello usa non è diventato uno stato fascista senza libertà di pensiero e parola....

reshared this

in reply to informapirata ⁂

@informapirata
tra un po va a finire che DEVI avere i social commerciali perche' devono controllarli.

reshared this

in reply to Luca Sironi

@informapirata
se non hai neanche instagram nel 2025, hai qualcosa da nascondere !

reshared this

in reply to Luca Sironi

spero di non doverci andare mai per lavoro. Perché da turista, non mi vedranno mai. Da turista fasso fadiga spostarme dal veneto!
No, scherzo. Ma sinceramente per il tipo di vacanze che faccio io, due sono le cose: non rompete le palle se mi spoglio, e datemi da mangiare che sia bene e abbondante. Solo l'Italia le può garantire entrambe nello stesso posto.
Finlandia e Olanda, ci sono stata 30 anni fa e mi trovai bene. Ma ora che hanno l'estrema destra pure loro in mezzo ai piedi...
Questa voce è stata modificata (1 settimana fa)

informapirata ⁂ reshared this.

in reply to Elena Brescacin

@underscorner @informapirata Non è come Facebook che danno fastidio ogni 3x2 ma siccome il pubblico è prettamente maschile e non vorrei mai succedesse qualcosa di fastidioso, specifico:
"non mi si rompa se mi spoglio" si intende stare in costume da bagno, in pantaloncini corti e magliettina, insomma sbragate.
Col culo dentro o fuori, di solito dentro. Perché basta la faccia, è un duplicato


Siccome siamo già all'11 e non l'ho ancora sentita, percepisco che questo potrebbe essere il mio anno e quindi ho deciso di gareggiare nell'epica sfida del #Whamageddon 😁

Stasera però vado a Pilates, lì c'è musica e sebbene l'istruttore sia un Grinch il rischio è alto...



Il Rabbino capo di Roma, Rav Riccardo Di Segni, e il Rabbino capo di Milano, Rav Alfonso Arbib, sono stati ricevuti questa mattina in udienza da Papa Leone XIV presso il Palazzo Apostolico Vaticano.


DNS-Massenüberwachung: „Das war dringend notwendig, diese neue Idee einer Schleppnetzfahndung im Internet abzuwenden“


netzpolitik.org/2025/dns-masse…



Gaza in ginocchio: freddo, pioggia e nuovi bombardamenti israeliani devastano il territorio


@Notizie dall'Italia e dal mondo
Sommersi i campi degli sfollati. A Khan Younis una neonata di otto mesi è morta per il freddo. L’Unrwa chiede aiuti urgenti per affrontare l’inverno
L'articolo Gaza in ginocchio: freddo, pioggia e nuovi bombardamenti



La Cina accelera sui portadroni. Primo volo per il Jiutian

@Notizie dall'Italia e dal mondo

La provincia dello Shaanxi, nella Cina nord-orientale, è stata teatro del primo volo di prova del “Jiutian”, termine cinese traducibile con “Nove cieli” che indica il mastodontico velivolo unmanned portadroni prodotto dalla statale Xi’an Chida Aircraft Parts Manufacturing e presentato dalla Repubblica









perché bisogna sempre tutti cascare nella trappola: "è un imprenditore, saprò come funziona l'economia..." per finire ogni volta di cadere dalla classica padella alla brace?


siamo gente di poco valore.


EDRi-gram, 11 December 2025


What has the EDRi network been up to over the past few weeks? Find out the latest digital rights news in our bi-weekly newsletter. In this edition: 2025 might be almost over, but we aren’t done fighting for digital rights

The post EDRi-gram, 11 December 2025 appeared first on European Digital Rights (EDRi).



linkiesta.it/2025/12/possibile…

credo che meloni che non è scema (anche se mediamente incompetente) ma solo malvagia sappia tutto. non è persona corretta.

reshared this



Migrant smuggling laws: European Commission found in breach of transparency rules


The European Ombudsman has found that the Commission disregarded important transparency rules while preparing the Europol Regulation, which is a part of the legislation to "counter migrant smuggling". The inquiry concluded that the Commission didn't provide enough evidence to justify the claims of "urgency" to bypass their own 'Better Regulation' rules, and skipping public consultations, thorough impact assessments and evidence gathering.

The post Migrant smuggling laws: European Commission found in breach of transparency rules appeared first on European Digital Rights (EDRi).



SìParte!

@Politica interna, europea e internazionale

19 dicembre 2025, ore 11:00 – Sala Galasso, Società Napoletana di Storia Patria – Castel Nuovo (Maschio Angioino), Via Vittorio Emanuele III, 310 – Napoli Saluti di Ugo de Flaviis, Referente Campania FLE Pier Camillo Falasca, Direttore L’Europeista Carmine Foreste, Pres. Ord. Avv. Napoli Marco Muscariello, Pres. Cam. Penale Napoli Introduce Vincenzo Maiello, Università “Federico […]



Sedotta e abbandonata, l’Ucraina rischia il tracollo


@Notizie dall'Italia e dal mondo
L'Ucraina di fronte a una tragica scelta: perdere altri territori o continuare a combattere una guerra ormai persa? Kiev intanto è sempre più vicina al punto di rottura
L'articolo Sedotta e abbandonata, l’Ucraina pagineesteri.it/2025/12/11/eur…



Leon Redbone, “mystery man”
freezonemagazine.com/articoli/…
“Mr. Redbone (…) ho composto questa canzone che sarebbe perfetta per lei, sir”- “Molto interessante (…) Questa canzone è stata scritta prima del 1940?” (Richard Flohil) Prima che si dissolva anche il 2025 è buono ricordare che fra tutte le ricorrenze che l’anno ha portato con sé (uno dei pochi meriti per cui sarà ricordato […]
L'articolo Leon Redbone, “mystery man” proviene da FREE ZONE MAGAZINE.