Salta al contenuto principale





al mondo c'è chi è vecchio dentro... come i trilobiti (porelli). e non è una bella cosa. l'idea che i russi abbiano una buona areonautica è piuttosto datata. non hanno neppure un grande amore per la tecnologia: basta ricordare lo z80 realizzato a transistor invece che come chip.


comunque a me va il sangue al cervello quando sento "ma l'ucraina è russa"... che poi a dirlo è la stessa gente che si lamenta che l'itala è USA... quindi completiamo con la cattiveria finale che mi fa girare le palle a me quando la sento: "ma dove sono i comunisti stalinisti italiani quando si tratta della libertà dell'italia?"


Garibaldi M. Lapolla – Il fuoco nella carne
freezonemagazine.com/news/gari…
In libreria dal 28 Marzo 2025 Il fuoco nella carne (The Fire in the Flesh, 1931), romanzo d’esordio di Garibaldi Mario Lapolla, una delle voci più importanti della letteratura italo-americana del primo Novecento. Il romanzo segue due linee narrative che si intrecciano, una storia d’amore segnata dal desiderio e dalla colpa e una scalata sociale […]
L'articolo Garibaldi M.


La Cina progredisce sui chip e sfida le restrizioni


@Informatica (Italy e non Italy 😁)
Costretta dalle sanzioni a creare un’industria interna di semiconduttori avanzati, la Repubblica Popolare è sempre più vicina al successo: le conseguenze geopolitiche potrebbero essere enormi.
L'articolo La Cina progredisce sui chip e sfida le restrizioni proviene da Guerre di Rete.

L'articolo proviene da



Allarme in Africa, la guerra in Congo rischia di estendersi


@Notizie dall'Italia e dal mondo
Scambio di accuse tra Burundi e Ruanda. Falliti i vari tentativi di mediazione, in Congo avanzano i ribelli sostenuti da Ruanda e Uganda. Kinshasa offre le proprie terre rare agli Stati Uniti in cambio di sostegno militare
L'articolo Allarme in Africa, la guerra in Congo rischia di estendersi proviene da Pagine Esteri.



La resilienza cyber nel mondo finanziario nel 2024


@Informatica (Italy e non Italy 😁)
La crescente importanza della resilienza dei dati e della sicurezza operativa in questo settore è al centro di un recente report della Cloud Security Alliance. Coinvolti 872 professionisti IT e della sicurezza provenienti da importanti istituti finanziari
L'articolo La resilienza cyber nel mondo



Prodi ha tirato i capelli alla giornalista di Rete 4: il video che smentisce l’ex premier


@Politica interna, europea e internazionale
Romano Prodi ha effettivamente tirato i capelli alla giornalista Lavinia Orefici, inviata del programma tv di Rete 4 Quarta Repubblica. Lo dimostra un video mandato in onda in esclusiva nella serata di ieri, martedì 25 marzo, durante DiMartedì, il talk show politico




Dati sanitari per propaganda elettorale: il Garante ribadisce l’illiceità del
trattamento


@Informatica (Italy e non Italy 😁)
I dati personali raccolti nell’ambito dell’attività di cura della salute da parte dei sanitari non sono utilizzabili per fini di propaganda elettorale senza uno specifico consenso degli interessati. Ecco cosa ribadisce l’Autorità



🖼️Bassorilievo con Veduta P.zza Montanara Roma Pro salvataggio 🌳🌳 Alberi Villa Pamphili Roma - Questo è un post automatico da FediMercatino.it

Prezzo: 150 € euro

🖼️Quadro con Veduta Piazza Montanara Roma; bassorilievo inciso su lastra Inscritta in duplice cornice in legno color oro e argento.
Misure: 39 cm X 32 cm .Autore: Blumal ; acquistato presso gioielleria Puleo.

link diretto all'acquisto🛒 👇

subito.it/arredamento-casaling…

📦🚚Spedizione tracciata e sicura disponibile 📦🚚
👉Per ulteriori informazioni e foto non esitare a contattarmi🌟

Con l’acquisto di questo articolo

Puoi devolvere il 50% del costo di questo articolo a favore del salvataggio degli ALBERI di Villa PAMPHIILJ ROMA
Si prega di contattarmi

NB: il 50% del costo di questo articolo potrai devolverlo
per sostenere le spese per il ricorso al Tar a favore del salvataggio degli alberi promossa dal Neomondismo

Sostieni le spese per il ricorso al TAR!
a favore del salvataggio degli ALBERI di Villa PAMPHIILJ ROMA

4fund.com/it/3mg8y9

pertanto se avrai aderito alla donazione il costo finale dell’articolo sarà pari al 50% del costo

Price: 150 € euro :: Questo è un articolo disponibile su FediMercatino.it

Si prega di rispondere con un messaggio diretto/privato al promotore dell'annuncio.

Per informazioni su: Fedimercatino: Chi siamo

Seguici su @FediMercatino - flohmarkt e sul gruppo @Il Mercatino del Fediverso 💵♻️

🔗 Link su FediMercatino.it per rispondere all'annuncio

@Il Mercatino del Fediverso 💵♻️



Tenera è la notte
freezonemagazine.com/rubriche/…
Nel 1994 a Los Angeles, dopo una tremenda scossa di terremoto che aveva provocato un blackout totale, molti cittadini si rivolsero alle autorità per sapere cosa fosse quella striscia lucente che avevano visto nel cielo: era la Via Lattea. La spropositata illuminazione notturna della “città degli angeli“, o meglio “El Pueblo de Nuestra Señora Reina […]
L'articolo Tenera è la notte proviene da FREE
Nel 1994 a Los


Designing a Portable Mac Mini


When Apple first launched the Macintosh, it created a new sort of “Lunchbox” form factor that was relatively portable and very, very cool. Reminiscent of that is this neat portable Macintosh Mini, created by [Scott Yu-Jan].

[Scott] has created something along these lines before—putting an iPad dock on top of a Macintosh Studio to create a look vaguely reminiscent of the very first Macintosh computers. However, that build wasn’t portable—it wasn’t practical to build such a thing around the Macintosh Studio. In contrast, the Mac Mini is a lithe, lightweight thing that barely sups power—it’s much more suitable for a “luggable” computer.

The build relies on a 3D printed enclosure that wraps around the Mac Mini like a glove. Inside, there’s a chunky 20,800 mAh power bank with enough juice to run the computer for over three hours. Just like the original Mac, there’s a handle on top, too. The build’s main screen is actually an iPad Mini, hooked up to the Mac Mini. If you want to use it separately, it can be popped out just by pushing it via a cutout in the bottom of the enclosure.

[Scott] notes that it’s cool, but not exactly practical—it weighs seven pounds, mostly due to the weight of the heavy power bank. We’ve featured [Scott’s] stylish builds before, too, like this nice iPhone dock.

youtube.com/embed/IXWmrXt52wM?…


hackaday.com/2025/03/25/design…



Physical Key Copying Starts With a Flipper Zero


A moment’s inattention is all it takes to gather the information needed to make a physical copy of a key. It’s not necessarily an easy process, though, so if pen testing is your game, something like this Flipper Zero key copying toolchain can make the process quicker and easier when the opportunity presents itself.

Of course, we’re not advocating for any illegal here; this is just another tool for your lock-sports bag of tricks. And yes, there are plenty of other ways to accomplish this, but using a Flipper Zero to attack a strictly mechanical lock is kind of neat. The toolchain posted by [No-Lock216] starts with an app called KeyCopier, which draws a virtual key blank on the Flipper Zero screen. The app allows you to move the baseline for each pin to the proper depth, quickly recording the bitting for the key. Later, the bitting can be entered into an online app called keygen which, along with information on the brand of lock and its warding, can produce an STL file suitable for downloading and printing.

Again, there are a ton of ways to make a copy of a key if you have physical access to it, and the comments of the original Reddit post were filled with suggestions amusingly missing the entire point of this. Yes, you can get a key cut at any hardware store for a buck or two that will obviously last a lot longer than a 3D-printed copy. But if you only have a few seconds to gather the data from the key, an app like KeyCopier could be really convenient. Personally, we’d find a smartphone app handier, but if you’ve got a Flipper, why not leverage it?

Thanks to [JohnU] for the tip.


hackaday.com/2025/03/25/physic…



In Germania la paura sta aumentando: "Questa potrebbe essere la nostra ultima estate di pace", ha dichiarato lo storico militare Sönke Neitzel alla Bild Zeitung il 22 marzo 2025, diffondendo così questo messaggio di panico tra la gente. “Putin potrebbe attaccare la NATO già in autunno”, ha affermato Neitzel. Penso che questo allarmismo sia completamente sbagliato. La paura viene utilizzata per controllare le persone e giustificare i miliardi spesi nell'industria delle armi. Ma la paura non è una buona consigliera. Divide la famiglia umana nella malvagia Russia e nella buona NATO. Oppure tra brave persone vaccinate e cattive persone non vaccinate. La paura ha sempre bisogno dell'immagine del nemico. Come persona non vaccinata, lo ricordo bene: cinque anni fa, a marzo 2020, il panico per i virus era dilagante e la società era divisa. Furono poi investiti miliardi nella vaccinazione contro il coronavirus. Il panico viene utilizzato ripetutamente per controllare le persone. Nel 2001, l'11 settembre alimentò la paura dei musulmani e la NATO dichiarò guerra all'Afghanistan per 20 anni. La guerra finì nel caos. La demolizione del WTC7 non è mai stata risolta. Conclusione: non dovremmo precipitarci ciecamente nel panico successivo, ma piuttosto praticare la consapevolezza e riflettere sugli ultimi 25 anni. Tutti appartengono alla famiglia umana. La paura e la divisione non ci porteranno da nessuna parte.

@DanieleGanser



Botnet: cosa sono, come funzionano, consigli per proteggere la rete aziendale dagli zombie del Web


@Informatica (Italy e non Italy 😁)
Le botnet sono nate come reti di computer usati per gestire e mantenere attivi servizi Web. I criminal hacker le hanno trasformate in reti di computer compromessi da usare per eseguire attività fraudolente. Ecco



Brazilian Modders Upgrade NVidia Geforce GTX 970 to 8 GB of VRAM


Although NVidia’s current disastrous RTX 50-series is getting all the attention right now, this wasn’t the first misstep by NVidia. Back in 2014 when NVidia released the GTX 970 users were quickly dismayed to find that their ‘4 GB VRAM’ GPU had actually just 3.5 GB, with the remaining 512 MB being used in a much slower way at just 1/7th of the normal speed. Back then NVidia was subject to a $30/card settlement with disgruntled customers, but there’s a way to at least partially fix these GPUs, as demonstrated by a group of Brazilian modders (original video with horrid English auto-dub).

The mod itself is quite straightforward, with the original 512 MB, 7 Gbps GDDR5 memory modules replaced with 1 GB, 8 Gbps chips and adding a resistor on the PCB to make the GPU recognize the higher density VRAM ICs. Although this doesn’t fix the fundamental split VRAM issue of the ASIC, it does give it access to 7 GB of faster, higher-density VRAM. In benchmarks performance was massively increased, with Unigine Superposition showing nearly a doubling in the score.

In addition to giving this GTX 970 a new lease on life, it also shows just how important having more VRAM on a GPU is, which is ironic in this era where somehow GPU manufacturers deem 8 GB of VRAM to be acceptable in 2025.

youtube.com/embed/JR5mm96Dj7k?…


hackaday.com/2025/03/25/brazil…



l'Unione psicopatica Europea vuole spendere 800 miliardi di euro in armi, ma per i giornalai da carta igienica è la Russia che ha un'economia di guerra.


Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain


In mid-March 2025, Kaspersky technologies detected a wave of infections by previously unknown and highly sophisticated malware. In all cases, infection occurred immediately after the victim clicked on a link in a phishing email, and the attackers’ website was opened using the Google Chrome web browser. No further action was required to become infected.

All malicious links were personalized and had a very short lifespan. However, Kaspersky’s exploit detection and protection technologies successfully identified the zero-day exploit that was used to escape Google Chrome’s sandbox. We quickly analyzed the exploit code, reverse-engineered its logic, and confirmed that it was based on a zero-day vulnerability affecting the latest version of Google Chrome. We then reported the vulnerability to the Google security team. Our detailed report enabled the developers to quickly address the issue, and on March 25, 2025, Google released an update fixing the vulnerability and thanked us for discovering this attack.

Acknowledgement for finding CVE-2025-2783 (excerpt from security fixes included into Chrome 134.0.6998.177/.178)
Acknowledgement for finding CVE-2025-2783 (excerpt from security fixes included into Chrome 134.0.6998.177/.178)

We have discovered and reported dozens of zero-day exploits actively used in attacks, but this particular exploit is certainly one of the most interesting we’ve encountered. The vulnerability CVE-2025-2783 really left us scratching our heads, as, without doing anything obviously malicious or forbidden, it allowed the attackers to bypass Google Chrome’s sandbox protection as if it didn’t even exist. The cause of this was a logical error at the intersection of Google Chrome’s sandbox and the Windows operating system. We plan to publish the technical details of this vulnerability once the majority of users have installed the updated version of the browser that fixes it.
Our research is still ongoing, but judging by the functionality of the sophisticated malware used in the attack, it seems the attackers’ goal was espionage. The malicious emails contained invitations supposedly from the organizers of a scientific and expert forum, “Primakov Readings”, targeting media outlets, educational institutions and government organizations in Russia. Based on the content of the emails, we dubbed the campaign Operation ForumTroll.

Example of a malicious email used in this campaign (translated from Russian)
Example of a malicious email used in this campaign (translated from Russian)

At the time of writing, there’s no exploit active at the malicious link – it just redirects visitors to the official website of “Primakov Readings”. However, we strongly advise against clicking on any potentially malicious links.

The exploit we discovered was designed to run in conjunction with an additional exploit that enables remote code execution. Unfortunately, we were unable to obtain this second exploit, as in this particular case it would have required waiting for a new wave of attacks and exposing users to the risk of infection. Fortunately, patching the vulnerability used to escape the sandbox effectively blocks the entire attack chain.

All the attack artifacts analyzed so far indicate high sophistication of the attackers, allowing us to confidently conclude that a state-sponsored APT group is behind this attack.

We plan to publish a detailed report with technical details about the zero-day exploit, the sophisticated malware, and the attackers’ techniques.

Kaspersky products detect the exploits and malware used in this attack with the following verdicts:

  • Exploit.Win32.Generic
  • Trojan.Win64.Agent
  • Trojan.Win64.Convagent.gen
  • PDM:Exploit.Win32.Generic
  • PDM:Trojan.Win32.Generic
  • UDS:DangerousObject.Multi.Generic


Indicators of Compromise


primakovreadings[.]info


securelist.com/operation-forum…



#Trump-#Yemen, segreti in chiaro


altrenotizie.org/primo-piano/1…


Nelle ultime 24 ore tre operai sono morti sul lavoro. La strage continua nel menefreghismo del governo. Chiediamo che sia finalmente introdotto il reato di omicidio sul lavoro perchè è inaccettabile che anche quando si accertano le responsabilità delle imprese le condanne risultino irrisorie. Il governo Meloni ha introdotto pene pesantissime inventando reati di ogni genere persino per reprimere le feste danzanti autogestite ma si guarda bene di intervenire per la sicurezza sul lavoro.
C’è bisogno di repressione e prevenzione con una rete capillare di controlli perchè la vita umana dovrebbe valere più del profitto. Bisogna investire nella sicurezza per chi lavora che è una vera emergenza non buttare soldi per le armi che arricchiscono azionisti dell’industria bellica. Si assumano ispettori e si ricostruisca una rete di controlli efficaci.
Purtroppo non c’è nulla da aspettarsi da questo governo. Per lanciare un segnale forte c’è bisogno di un grande partecipazione al voto nel referendum promosso dalla Cgil che, tra i quesiti, prevede un intervento sacrosanto per la sicurezza cancellando l’attuale norma sui subappalti.
Non rassegniamoci alla strage.

Maurizio Acerbo, segretario nazionale del Partito della Rifondazione Comunista – Sinistra Europea



LED Filaments Become Attractive Time Piece


There are a million ways to use LEDs to make a clock. [sjm4306] chose to go a relatively conventional route, making something that approximates a traditional analog timepiece. However, he did it using LED filaments to create a striking and unique design. Thus the name—FilamenTIME!

LED filaments are still relatively new on the scene. They’re basically a bunch of tiny LCDs mounted in a single package to create a single “filament” of light that appears continuous. It’s great if you want to create a bar of light without messing around with populating tons of parts and having to figure out diffusion on your own.

[sjm4306] used them to create glowing bar elements in a clock for telling the time. The outer ring contains 60 filaments for the 60 minutes in an hour, while the inner ring contains 12 filaments to denote the hours themselves. To handle so many LEDs, there are 9 shift registers on board. They’re driven by an ATmega328P which runs the show, with a DS3232MZ real-time clock onboard for keeping time. As you might imagine, creating such a large circular clock required a large PCB—roughly a square foot in size. It doesn’t come cheap, though [sjm4306] was lucky enough to have sponsorship to cover the build. [sjm4306] is still working on the firmware, and hopes to build a smaller, more compact version, which should cut costs compared to the large single board.

It’s a neat clock, and we’d know, having seen many a timepiece around these parts. Video after the break.

youtube.com/embed/KHyncdWXaz8?…


hackaday.com/2025/03/25/led-fi…



Spero sia così per via degli acidi, perché se fosse così naturalmente, è una psicopatica fulminata.


Tavoletta grafica Wacom Bamboo Pen & Touch CTH-470 - Questo è un post automatico da FediMercatino.it

Prezzo: 20 €

Vendo tavoletta grafica Wacom Bamboo Pen & Touch CTH-470, completa di tutti gli accessori e scatola originale.

La tavoletta è stata testata con Windows 11 anche con il driver ufficiale wacom e con Debian 12.

Dispositivo entry level per disegno digitale, fotoritocco sia con la penna che con il tocco delle dita.
Dimensioni della tavoletta: 28 x 17,5 cm x 1 cm di spessore.

Disponibile per consegna a mano zona Torino. Contattatemi per concordare l'eventuale spedizione tramite subito o vinted.

Price: 20 € :: Questo è un articolo disponibile su FediMercatino.it

Si prega di rispondere con un messaggio diretto/privato al promotore dell'annuncio.

Per informazioni su: Fedimercatino: Chi siamo

Seguici su @FediMercatino - flohmarkt e sul gruppo @Il Mercatino del Fediverso 💵♻️

🔗 Link su FediMercatino.it per rispondere all'annuncio

@Il Mercatino del Fediverso 💵♻️



The hottest use of AI right now? Dora the Explorer feet mukbang; Peppa the Pig Skibidi toilet explosion; Steph Curry and LeBron James Ahegao Drakedom threesome.#AI #Instagram


The Vectrex Home Computer You Never Had


The Vectrex console from the early 1980s holds a special place in retrocomputing lore thanks to its vector display — uniquely for a home system, it painted its graphics to the screen by drawing them with an electron beam, instead of scanning across a raster as a TV screen would. It thus came with its own CRT, and a distinctive vertical screen form factor.

For all that though, it was just a games console, but there were rumors that it might have become more. [Intric8] embarked on a quest to find some evidence, and eventually turned up what little remains in a copy of Electronic Games magazine. A keyboard, RAM and ROM expansion, and a wafer drive were in the works, which would have made the Vectrex a quirky equal of most of what the likes of Commodore and Sinclair had to offer.

It’s annoying that it doesn’t specify which issue of the magazine has the piece, and after a bit or browsing archive.org we’re sorry to say we can’t find it ourselves. But the piece itself bears a second look, for what it tells us about the febrile world of the 8-bit games industry. This was a time of intense competition in the period around the great console crash, and developers would claim anything to secure a few column inches in a magazine. It’s not to say that the people behind the Vectrex wouldn’t have produced a home computer add-on for it if they could have done, but we remember as teenagers being suckered in by too many of these stories. We still kinda want one, but we’d be surprised if any ever existed.

If you have a Vectrex, it’s possible to give it a light pen.


hackaday.com/2025/03/25/the-ve…



An essay on user preferences, and how the fediverse's interconnected network of communities can play into that, as well as some other news.


Fediverse Report – #109

An essay on user preferences, and how the fediverse’s interconnected network of communities can play into that, as well as some other news.

User Intents


The Bluesky Company (Bluesky PBC) recently announced a proposal to add User Intents to the AT Protocol (ATProto). The proposal allows people to set account-wide preferences how their data should be handled outside the network. It gives people the ability to opt in or opt out their account from a few different things, such as bridging to other protocols or not wanting any of their data being used in generative AI datasets. The proposal is similar to how robots.txt works, meaning that it is a machine-readable format which good actors are supposed to abide by, but is not legally enforceable.

I cover both the fediverse and Bluesky (including ATProto) under Fediverse Report because these networks are deeply interconnected and influence each other. Decisions on one network, like Bluesky’s User Intents proposal, can influence how the fediverse develops and builds their own features. My goal is to help readers understand the fediverse more deeply. By observing how Bluesky’s approaches default user preferences, the fediverse can build their own systems that use its strength of having many diverse and connected communities.

The proposal by Bluesky PBC is as follows:

  • People are able to set their preferences for four different categories:
    • generative AI
    • protocol bridging
    • bulk datasets
    • public archiving and preservation


  • These preferences are account wide. They are valid not only for Bluesky, but for every app build on ATProto.
  • The default value is ‘undefined’, not opt-in or opt-out.
    • Projects which are intending to use the public data should decide for themselves whether data reuse when the intents are classified as “undefined” is acceptable or not.


  • the current proposal is set to lead the way for more granular user preferences, allowing people to specify on an app-level or post-level what their preference is.

Also, some concepts of ATProto that are relevant, which makes the protocol different from ActivityPub:

  • On ATProto, a user has only 1 account, and can use that account to log into any service. This is in contrast with ActivityPub, where you need a new account for every service.
  • Data on ATProto is public by default, and designed to be accessible. Everyone has full and free access to the data of the entire network.

One thing about user preference settings in social apps is that they are a bit of red herring. The majority of people never change the default settings. Giving people choice is a good thing, but it is impossible force people to choose: the majority of people will just not choose anything. This makes it so that the default value for any preference is hugely important, as it is the de-facto value that the majority of people will experience.

Bluesky PBC tries to avoid this issue by introducing a default “undefined” value. The advantage of using a default value of “undefined” is that Bluesky PBC will not overstep their boundaries and determine the preference of everyone on the network, including people who are not using Bluesky but are using other platforms on the network. The downside is that Bluesky PBC effectively makes no decision at all for the majority of people. Bluesky PBC leaves it to the organisations who use the data to determine how data can be handled if the preference is set to “undefined”. These organisations are likely to value their own interests more than the interest of people whose data they intent to process.

Bluesky PBC has three options here, that all have a downside:

  • If Bluesky PBC sets default values for how ATProto account data can be handled it reinforces its centralising role in the network.
  • If Bluesky PBC does not set a default value, no decision is made for the majority of people, and it is left to organisations whose goals do not align with those of the people whose data they process.
  • If Bluesky PBC sets User Intent not on an ATProto-account wide level, but only on an per-app basis, choices quickly become overwhelming if users must set preferences for every app.

So far I’ve only been talking about Bluesky and ATProto. But the fediverse has a long history of debates, conversations and drama on how to deal with data processing that happens outside of the network. Some high-profile cases include the blowup around Bridgy Fed considering making the bridge between the fediverse and Bluesky opt-out, or the backlash against Searchtodon, which saved user’s timeline locally for searching.

These debates are around data scraping, consent, things being opt-in or opt-out. But one of the struggles that the fediverse has had is to build structural solutions. A significant portion of the fediverse does not consent to have their data handled outside of the network. A persistent problem is that this preference is not expressed in a machine-readable way. This leads to an endless cycle of new developers coming in that are not familiar with the culture who then cross lines of consent and it all blows up in drama again.

Moreover, the fediverse and ActivityPub have a significant advantage on how to deal with the dilemma of setting default values over ATProto. The fediverse is a network that is build up of many different communities connecting with each other. A variety of communities allows for diverse preferences, which can also be expressed in setting default values. And it is a shame that the fediverse is not capitalising on this advantage.

There are communities from whom discoverability is important. Just as there are communities for whom not being easily publicly discoverable is important. These preference can differ within an individual as well: people treat personal photos shared with friends differently from blog articles.

The fediverse can sidestep the question of default account values because people have many accounts on the fediverse, for different use cases. This gives the option to set a different default value for different services. A Pixelfed platform for close friends should set stricter default data-handling preferences. A Mastodon server for blogging platform Medium that has the goal of giving more visibility and reach to its writers could consider setting default values to be more open.

The power of the fediverse is in that there does not have to be a single default at all. Instead, communities and servers should be able to set default values for themselves. This can help shape the tone of the community, and makes it clear what the identity of a community is about. What’s even more powerful is that this only concerns the default value, giving people the ability to set their preferences as they desire. The state of the open social web is such that there are now two protocols in competition with each other. That gives the ability for the fediverse to take ideas from other networks, and improve on them in a way that plays up to the unique strengths that the fediverse has.

The News


Reminder: next week will be FediForum, on April 1-2, and you can register here.

FediverseSharing: A Novel Dataset on Cross-Platform Interaction Dynamics between Threads and Mastodon Users is a new academic paper (currently under review and up on arXiv) that explores the interaction between Threads users and Mastodon users. It takes a dataset of 20k Threads users that have fediverse sharing enabled and compares it to 20k Mastodon users that have interacted with these Threads users. The main goal of the research is to build up this dataset and share it with the community for further research. How sharing a dataset of aggregated user interactions relates to the above essay on user preferences for being included in bulk datasets is left as an exercise to the reader.

PeerTube has done a major redesign for their v7 of the software that came out a few months ago. The organisation now shared the design and development reports that shaped the update.

IFTAS recently had to shut down most of their larger projects due to a lack of funding. One of their projects, FediCheck is now available as open source for someone else to continue with. FediCheck is a deny list management tool that allows server admins to subscribe to external deny lists.

The Lemmy developers will hold an AMA on Wednesday March 26th.

Last week, Ghost made their ActivityPub integration available in public beta for Ghost Pro subscribers. Their weekly update says that now over 250 sites already use the integration. WeDistribute has a hands on with the new features that Ghost offers.

Note: Last week I wrote about the new fediverse platform Forte, and said that the repository did not include an install guide. This is incorrect, the guide can be found here.

The Links


That’s all for this week, thanks for reading! You can subscribe to my newsletter to get all my weekly updates via email, which gets you some interesting extra analysis as a bonus, that is not posted here on the website. You can subscribe below:

#fediverse

fediversereport.com/fediverse-…




l'idea di base italiana, mediamente a sostegno dei bulli, è che se sei bullizzato è colpa tua, perché basterebbe non uscire di casa e quindi non offendi nessuno con la tua presenza e nessuno ti bullizza. e se io volessi uscire? la risposta: non si può avere la moglie ubriaca e la botte piena... STRAMALEDETTI BULLI. italia patria di bulli.


Priorità a Mediterraneo allargato e stabilizzazioni regionali. La visione di Portolano per il 2025

@Notizie dall'Italia e dal mondo

Una visione organica, che tiene insieme deterrenza e diplomazia, proiezione internazionale e consolidamento interno. È lungo questa direttrice che si è sviluppato l’intervento del capo di Stato maggiore della Difesa, il



#MiStaiACuore, partecipa anche tu alla campagna del Ministero volta a sensibilizzare scuole, studenti e famiglie sul primo soccorso e sull’utilizzo del defibrillatore semiautomatico esterno (DAE).


c 'è qualcuno che pensa che la nato sia ancora "reale"? qualsiasi genere di alleanza con gli USA direi che è finita. e pare pure miope visto che siano gli unici per certi versi dalla stessa parte. poi ci rimane giappone e australia e la lista è finita.

reshared this

in reply to simona

credo che rimanga solo da prendere atto che adesso è così.
in reply to simona

comunque trump & i suoi amici sono come putin. non hanno valori. rispettano solo la forza. e l'europa pare (ed è magari) fragile, anche se magari non da tutti i punti di vista.


Report di febbraio di Acn: ecosistema italiano più resiliente, ecco i settori con più vittime


@Informatica (Italy e non Italy 😁)
Cresce il numero di eventi, ma rimangono stabili gli incidenti, mentre crescono gli attacchi DDoS contro la PA centrale. Ecco i punti salienti del nuovo Operational summary, il report di febbraio di Acn, e come mitigare i



La proposta di Dario Franceschini (Pd): “Dare ai figli automaticamente il solo cognome della madre”


@Politica interna, europea e internazionale
Dare ai figli automaticamente il solo cognome della madre. La proposta arriva dal senatore del Partito democratico Dario Franceschini, che secondo l’Ansa sarebbe pronto a presentare un disegno di legge ad hoc a Palazzo Madama. Franceschini spiega la



Google Gemini 2.0 Sotto Accusa: Può Eliminare le Filigrane dalle Immagini!


Gli utenti dei social media segnalano di aver trovato un nuovo modo per utilizzare il nuovo modello di intelligenza artificiale Gemini: rimuovere le filigrane dalle immagini, comprese quelle pubblicate da Getty Images e altre note banche dati fotografiche.

La settimana scorsa, Google ha reso disponibile la funzionalità di generazione di immagini nel modello Flash Gemini 2.0, che consente di generare e modificare contenuti di immagini.

Come hanno scoperto gli utenti, il modello presenta ancora poche restrizioni di protezione. Ad esempio, Gemini 2.0 Flash crea contenuti che raffigurano personaggi famosi e personaggi protetti da copyright senza alcuna riserva, e rimuove anche le filigrane dalle immagini.

Come sottolineano gli utenti di X e Reddit, Gemini 2.0 Flash non si limita a rimuovere le filigrane, ma cerca anche di colmare le lacune lasciate dalla loro rimozione. Altri strumenti di intelligenza artificiale funzionano in modo simile, ma Gemini 2.0 Flash produce risultati più impressionanti e inoltre lo strumento di Google è gratuito.

Vale la pena notare che la funzionalità di generazione delle immagini in Gemini 2.0 Flash è attualmente etichettata come “sperimentale” e “non per uso di produzione” ed è disponibile solo negli strumenti per sviluppatori di Google, come AI Studio (la funzionalità è disponibile per i tester da dicembre 2024).

Come sottolinea TechCrunch, è probabile che i detentori del copyright non saranno d’accordo con la mancanza di restrizioni di sicurezza in Gemini 2.0 Flash. Dopotutto, altri modelli, tra cui Claude 3.7 Sonnet di Anthropic e GPT-4o di OpenAI, si rifiutano categoricamente di rimuovere le filigrane, e Claude lo definisce “non etico e potenzialmente illegale”.

Pertanto, la rimozione di una filigrana da un’immagine senza il consenso del proprietario è considerata illegale ai sensi della legge statunitense sul copyright, salvo rare eccezioni. I rappresentanti di Google hanno rilasciato ai giornalisti il ​​seguente commento: “L’utilizzo degli strumenti di intelligenza artificiale generativa di Google per commettere violazioni del copyright costituisce una violazione dei nostri termini di servizio. Come per tutte le versioni sperimentali, le monitoriamo attentamente e ascoltiamo il feedback degli sviluppatori.”

L'articolo Google Gemini 2.0 Sotto Accusa: Può Eliminare le Filigrane dalle Immagini! proviene da il blog della sicurezza informatica.



Ancient Pocket Computer Gets a Serious Serial Upgrade


[Robert’s Retro] is one of those great YouTube channels that shows us the ins and outs of old and obscure computers. [Robert] likes going a step beyond the traditional teardown though, repairing and upgrading these old machines. His latest project involves giving the ZEOS Pocket PC a fully-functional serial port.

If you’re unfamiliar with the ZEOS Pocket PC, you might know it as the Tidalwave PS-1000—it’s a pretty straightforward clone. Originally, these machines could be had with a proprietary serial adapter to enable them to interface with external peripherals. However, like most obscure cables and connectors from three decades ago, they’re virtually unobtainable today.

To solve this problem, [Robert] decided to hack in a traditional DE-9 connector instead. Commonly referred to as the DB-9, this is the most common serial port design used on IBM PCs and compatibles. Getting the larger port into the compact PC required some careful hacking of the case, as well as delicate soldering to hook up the pins to the right signals on the tightly-packed motherboard. This video does involve cutting some vintage plastic, but overall it’s a very neat mod that is handled with due respect and care.

This isn’t the first time we’ve seen him upgrade a classic portable computer, either.

youtube.com/embed/8IdkVxCv1t8?…


hackaday.com/2025/03/25/ancien…