Salta al contenuto principale




Dare luogo alla pace. A Catania la Piazza delle Tre Culture


@Giornalismo e disordine informativo
articolo21.org/2025/09/dare-lu…
Riparte da Catania la “Global Sumud Flottilla”. Basterà un filo di maestrale per far giungere i pacifisti (non terroristi!) in Palestina. La Sicilia si dimostra ancora crocevia del Mediterraneo e

Alfonso reshared this.



One Camera Mule to Rule Them All


A mule isn’t just a four-legged hybrid created of a union betwixt Donkey and Horse; in our circles, it’s much more likely to mean a testbed device you hang various bits of hardware off in order to evaluate. [Jenny List]’s 7″ touchscreen camera enclosure is just such a mule.

In this case, the hardware to be evaluated is camera modules– she’s starting out with the official RPi HQ camera, but the modular nature of the construction means it’s easy to swap modules for evaluation. The camera modules live on 3D printed front plates held to the similarly-printed body with self-tapping screws.

Any Pi will do, though depending on the camera module you may need one of the newer versions. [Jenny] has got Pi4 inside, which ought to handle anything. For control and preview, [Jenny] is using an old first-gen 7″ touchscreen from the Raspberry Pi foundation. Those were nice little screens back in the day, and they still serve well now.

There’s no provision for a battery because [Jenny] doesn’t need one– this isn’t a working camera, after all, it’s just a test mule for the sensors. Having it tethered to a wall wart or power bank is no problem in this application. All files are on GitHub under a CC4.0 license– not just STLs, either, proper CAD files that you can actually make your own. (SCAD files in this case, but who doesn’t love OpenSCAD?) That means if you love the look of this thing and want to squeeze in a battery or add a tripod mount, you can! It’s no shock that our own [Jenny List] would follow best-practice for open source hardware, but it’s so few people do that it’s worth calling out when we see it.

Thanks to [Jenny] for the tip, and don’t forget that the tip line is open to everyone, and everyone is equally welcome to toot their own horn.


hackaday.com/2025/09/03/one-ca…

informapirata ⁂ reshared this.



Nuovi ricatti: se non paghi, daremo tutti i tuoi dati in pasto alle intelligenze artificiali!


Il gruppo di hacker LunaLock ha aggiunto un nuovo elemento al classico schema di estorsione, facendo leva sui timori di artisti e clienti. Il 30 agosto, sul sito web Artists&Clients, che mette in contatto illustratori indipendenti con i clienti, è apparso un messaggio: gli aggressori hanno segnalato il furto e la crittografia di tutti i dati della risorsa.

Gli hacker hanno promesso di pubblicare il codice sorgente del sito e le informazioni personali degli utenti nelle darknet se il proprietario non avesse pagato 50.000 dollari in criptovaluta. Ma la principale leva di pressione era la prospettiva di trasferire le opere e le informazioni rubate ad aziende che addestrano le reti neurali per includerle in set per modelli di addestramento.

Il sito ha pubblicato una nota con un timer per il conto alla rovescia, in cui si informava che se la vittima si fosse rifiutata di pagare, i file sarebbero stati resi pubblici. Gli autori hanno avvertito di possibili sanzioni per violazione del GDPR e di altre leggi. Il pagamento era richiesto in Bitcoin o Monero. Screenshot della notifica sono stati diffusi sui social network e persino Google è riuscito a indicizzare la pagina con il messaggio, dopodiché Artists&Clients ha smesso di funzionare: quando si tenta di accedere, gli utenti visualizzano un errore di Cloudflare.

La maggior parte del testo sembra un messaggio standard negli attacchi ransomware. La novità è l’accenno all’intenzione di consegnare i disegni e i dati rubati agli sviluppatori di intelligenza artificiale. Gli esperti hanno osservato che questa è la prima volta che vedono l’argomento relativo all’accesso ai set di addestramento utilizzato come metodo di pressione. Finora, tale possibilità era stata discussa solo teoricamente: ad esempio, che i criminali potessero analizzare i dati per calcolare l’importo del riscatto.

Non è ancora chiaro come gli aggressori trasferiranno esattamente i materiali artistici agli sviluppatori dell’algoritmo. Possono pubblicare le immagini su un sito normale e attendere che vengano rilevate dai crawler dei modelli linguistici. Un’altra opzione è caricare le immagini tramite i servizi stessi, se le loro regole consentono l’utilizzo dei contenuti degli utenti per l’addestramento. In ogni caso, la minaccia stessa spinge la comunità di artisti e clienti a fare pressione sull’amministrazione delle risorse chiedendo il pagamento di un riscatto per mantenere il controllo sulle proprie opere.

Al momento, il sito web di Artists&Clients rimane irraggiungibile. Nel frattempo, gli utenti continuano a discutere della minaccia e a condividere online screenshot acquisiti, il che non fa che aumentare la visibilità dell’attacco.

L'articolo Nuovi ricatti: se non paghi, daremo tutti i tuoi dati in pasto alle intelligenze artificiali! proviene da il blog della sicurezza informatica.



Jaguar Land Rover vittima di attacco hacker: produzione interrotta!


La casa automobilistica Jaguar Land Rover (JLR) ha annunciato di essere stata costretta a disattivare diversi sistemi a causa di un attacco hacker. L’incidente sembra aver avuto ripercussioni sulle attività produttive e di vendita al dettaglio della casa automobilistica.

“JLR è stata colpita da un incidente informatico. Abbiamo preso misure immediate per mitigare l’impatto spegnendo preventivamente i nostri sistemi”, ha dichiarato l’azienda in una nota. “Al momento non ci sono prove di furto di dati dei clienti, tuttavia le nostre attività di vendita al dettaglio e produzione hanno subito notevoli interruzioni”.

JLR ha inoltre affermato di essere attualmente al lavoro su un riavvio controllato di tutte le applicazioni globali. L’azienda non ha fornito una tempistica specifica per il ritorno alla normalità né dettagli sull’attacco subito.

Le prime segnalazioni di disagi alla JLR sono arrivate dai concessionari del Regno Unito, che si sono lamentati di non riuscire a immatricolare le nuove auto e a fornire i pezzi di ricambio ai centri di assistenza.

Secondo il Liverpool Echo, l’attacco è avvenuto nel fine settimana e l’incidente ha costretto la JLR a disattivare diversi sistemi, tra cui quelli utilizzati nello stabilimento produttivo di Solihull (dove vengono costruiti i modelli Land Rover Discovery, Range Rover e Range Rover Sport).

Secondo quanto riportato dai media, lunedì i lavoratori dello stabilimento di Halewood hanno ricevuto un’e-mail in cui si chiedeva loro di non presentarsi al lavoro, mentre altri membri dello staff sono stati mandati a casa.

Al momento, nessun gruppo di hacker ha rivendicato la responsabilità dell’attacco alla Jaguar Land Rover.

L'articolo Jaguar Land Rover vittima di attacco hacker: produzione interrotta! proviene da il blog della sicurezza informatica.

Gazzetta del Cadavere reshared this.



FLOSS Weekly Episode 845: The Sticky Spaghetti Gauge


This week Jonathan and Randal talk Flutter and Dart! Is Google killing Flutter? What’s the challenge Randal sees in training new senior developers, and what’s the solution? Listen to find out!

youtube.com/embed/HzZQacDIxZg?…

Did you know you can watch the live recording of the show right on our YouTube Channel? Have someone you’d like us to interview? Let us know, or contact the guest and have them contact us! Take a look at the schedule here.

play.libsyn.com/embed/episode/…

Direct Download in DRM-free MP3.

If you’d rather read along, here’s the transcript for this week’s episode.

Places to follow the FLOSS Weekly Podcast:


Theme music: “Newer Wave” Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License


hackaday.com/2025/09/03/floss-…



Vi racconto la missione di Praexidia, la fondazione a tutela delle imprese. Parla il gen. Goretti

@Notizie dall'Italia e dal mondo

Difesa, aerospazio, cybersicurezza, biotecnologie e infrastrutture critiche: sono questi i settori al centro della missione della Fondazione Praexidia, nuova realtà nata con l’obiettivo di tutelare e valorizzare le filiere



YouTuber Benn Jordan has never been to Israel, but Google's AI summary said he'd visited and made a video about it. Then the backlash started.

YouTuber Benn Jordan has never been to Israel, but Googlex27;s AI summary said hex27;d visited and made a video about it. Then the backlash started.#News #AI

#ai #News #x27



Ask Hackaday: Now You Install Your Friends’ VPNs. But Which One?


Something which may well unite Hackaday readers is the experience of being “The computer person” among your family or friends. You’ll know how it goes, when you go home for Christmas, stay with the in-laws, or go to see some friend from way back, you end up fixing their printer connection or something. You know that they would bridle somewhat if you asked them to do whatever it is they do for a living as a free service for you, but hey, that’s the penalty for working in technology.

Bad Laws Just Make People Avoid Them


There’s a new one that’s happened to me and no doubt other technically-minded Brits over the last few weeks: I’m being asked to recommend, and sometimes install, a VPN service. The British government recently introduced the Online Safety Act, which is imposing ID-backed age verification for British internet users when they access a large range of popular websites. The intent is to regulate access to pornography, but the net has been spread so wide that many essential or confidential services are being caught up in it. To be a British Internet user is to have your government peering over your shoulder, and while nobody’s on the side of online abusers, understandably a lot of my compatriots want no part of it. We’re in the odd position of having 4Chan and the right-wing Reform Party alongside Wikipedia among those at the front line on the matter. What a time to be alive.

VPN applications have shot to the top of all British app download charts, prompting the government to flirt with deny the idea of banning them, but as you might imagine therein lies a problem. Aside from the prospect of dodgy VPN apps to trap the unwary, the average Joe has no idea how to choose from the plethora of offerings. A YouTuber being paid to shill “that” VPN service is as close of they’ve ever come to a VPN, so they are simply unequipped to make a sound judgement when it comes to trusting a service with their web traffic. They have no hope of rolling their own VPN; setting up WireGuard and still further having a friend elsewhere in the world prepared to act as their endpoint are impractical.

It therefore lies upon us, their tech-savvy friends, to lead them through this maze. Which brings me to the point of this piece; are we even up to the job ourselves? I’ve been telling my friends to use ProtonVPN because their past behaviour means I trust Proton more than I do some of the other well-known players, but is my semi-informed opinion on the nose here? Even I need help!

Today Brits, Tomorrow The Rest Of You


At the moment it’s Brits who are scrambling for VPNs, but it seems very likely that with the EU yet again flirting with their ChatControl snooping law, and an American government whose actions are at best unpredictable, soon enough many of the rest of you will too. The question is then: where do we send the non-technical people, and how good are the offerings? A side-by-side review of VPNs has been done to death by many other sites, so there’s little point in repeating. Instead let’s talk to some experts. You lot, or at least those among the Hackaday readership who know their stuff when it comes to VPNs. What do you recommend for your friends and family?

Header image: Nenad Stojkovic, CC BY 2.0.


hackaday.com/2025/09/03/ask-ha…



L’eredità dell’omicidio Dalla Chiesa e le cose ancora da fare


@Giornalismo e disordine informativo
articolo21.org/2025/09/leredit…
La memoria del generale, prefetto, Carlo Alberto Dalla Chiesa, assassinato a Palermo il 3 settembre 1982 all’esito di una convergenza di interessi mai completamente chiarita e punita può anche



Dai think tank al campo di battaglia. L’IA militare tra Washington e Kyiv

@Notizie dall'Italia e dal mondo

Dalle linee di trincea ucraine fino alla Silicon Valley, passando per gli uffici del Pentagono. La corsa all’intelligenza artificiale militare rappresenta oggi il nuovo terreno di competizione tra potenze. La notizia riportata da Politico, nuda e cruda, è che quando affidi scenari di crisi a modelli




Israele manda i droni contro l’Onu. Unifil: “Granate a venti metri da noi”


@Notizie dall'Italia e dal mondo
La missione ONU in Libano accusa Israele di aver messo in pericolo il proprio personale nonostante l’avviso preventivo; cresce la tensione lungo la frontiera mentre resta irrisolto il ritiro delle truppe dal sud del Paese.
L'articolo Israele manda i droni contro l’Onu. Unifil: “Granate a



Trump sceglie “Rocket city” come nuova sede dell’US Space command

@Notizie dall'Italia e dal mondo

Dopo speculazioni sulle possibili novità annunciate durante la conferenza stampa di Trump, tra cui l’ipotesi di un intervento contro il Venezuela, il presidente americano ha sorpreso tutti annunciando il trasferimento del quartier generale dello US Space command da Colorado Springs, Colorado, a




Burkina Faso, nuova legge contro la comunità LGBTQ: fino a cinque anni di carcere


@Notizie dall'Italia e dal mondo
La nuova normativa, approvata all’unanimità dal parlamento di transizione, prevede da due a cinque anni di carcere, multe e la deportazione per gli stranieri recidivi.
L'articolo Burkina Faso, nuova legge contro la comunità LGBTQ: fino a cinque



Meno vincoli, più sviluppo. Nasce l’Osservatorio sul Diritto all’Innovazione

@Politica interna, europea e internazionale

MENO VINCOLI, PIÙ SVILUPPO Nasce l’Osservatorio sul diritto all’innovazione, 9 settembre 2025, ore 13:00, Sala “Caduti di Nassirya”, Senato della Repubblica Interverranno Andrea Cangini, Segretario generale Fondazione Einaudi e Direttore Osservatorio sul



GRUB1 e il colpo supply-chain: così un chatbot ha messo a rischio Cloudflare (e non solo)


@Informatica (Italy e non Italy 😁)
Il patto implicito tra un’azienda e i suoi clienti si regge su un pilastro fondamentale: la fiducia. Fiducia che i propri dati, anche quelli condivisi per risolvere un problema tecnico urgente, siano al sicuro. All’inizio di settembre,



La US Navy affonda una barca di trafficanti venezuelani. Tensione nel Mar dei Caraibi

@Notizie dall'Italia e dal mondo

Una nave della US Navy ha intercettato e affondato un’imbarcazione carica di droga, partita dal Venezuela e legata – secondo Washington – a un’organizzazione narco–terrorista vicina al governo di Nicolás Maduro. L’operazione è stata annunciata dal segretario di Stato Marco Rubio e



YaraSensei, la webapp che potenzia le regole YARA con il RAG e l’AI di Google


@Informatica (Italy e non Italy 😁)
Oggi, scrivere regole YARA efficaci è un’arte. È un bilanciamento costante tra copertura e precisione, tra il rischio di falsi positivi e quello di lasciarsi sfuggire una variante malevola. Ora, a dare una mano ai threat hunter e ai ricercatori arriva



“Faccetta nera” alla festa di Coldiretti di Benevento


@Giornalismo e disordine informativo
articolo21.org/2025/09/faccett…
C’è un’Italia che non si accorge nemmeno più dei propri fantasmi. Non perché siano spariti, ma perché li ha accolti come parte del paesaggio: dettagli pittoreschi, incidenti tecnici, folklore da archiviare. A



Immigrazione, bocciata la strategia di Trump: non è un’invasione


@Notizie dall'Italia e dal mondo
La legge, invocata solo durante la Guerra del 1812 e i due conflitti mondiali, non può essere usata per giustificare rimpatri di massa in tempo di pace.
L'articolo Immigrazione, pagineesteri.it/2025/09/03/mon…



Premio Internazionale Giovanni Malagodi 2025

@Politica interna, europea e internazionale

Interverranno Giuseppe Benedetto, Presidente Fondazione Einaudi Andrea Cangini, Segretario generale Fondazione Einaudi Marco Mariani, Vicepresidente European Liberal Forum Ilhan Kyuchyuk, Parlamentare europeo, già Co-Presidente Alde Party Cerimonia di consegna del Premio a Karl-Heinz Paqué, Presidente Liberal



Pornhub's parent company Aylo and its affiliates settled a lawsuit with the FTC and Utah that alleged the company "deceived users" about abuse material on the site.

Pornhubx27;s parent company Aylo and its affiliates settled a lawsuit with the FTC and Utah that alleged the company "deceived users" about abuse material on the site.#pornhub #FTC


Pornhub Will Pay $5 Million Over Allegations of Hosting Child Sexual Abuse Material


The Federal Trade Commission announced Wednesday that Pornhub and its parent company Aylo settled a lawsuit filed by the Federal Trade Commission and the state of Utah.

The FTC and Utah’s attorney general claimed that Pornhub and its affiliates “deceived users by doing little to block tens of thousands of videos and photos featuring child sexual abuse material (CSAM) and nonconsensual material (NCM) despite claiming that this content was ‘strictly prohibited,’” the FTC wrote in a press release.

“As part of a proposed order settling the allegations, Pornhub’s operators, Aylo and its affiliated companies (collectively Aylo), will be required to establish a program to prevent the distribution of CSAM and NCM on its websites and pay a $5 million penalty to the state of Utah,” it said.

“This settlement reaffirms and enhances Aylo’s efforts to prevent the publication of child sexual abuse material (CSAM) and non-consensual material (NCM) on its platforms,” a spokesperson for Aylo told 404 Media said in a statement. “Aylo is committed to maintaining the highest standards of safety and compliance on its platforms. While the FTC and Utah DCP [Division of Consumer Protection] have raised serious concerns and allege that some of Aylo’s user generated content websites made available videos and photos containing CSAM and NCM, this agreement strengthens the comprehensive safeguards that have been in place for years on Aylo platforms. These measures reflect Aylo’s ongoing commitment to constantly evolving compliance efforts. Importantly, this settlement resolves the matter with no admission of wrongdoing while reaffirming Aylo’s commitment to the highest standards of platform safety and compliance.”

In addition to the penalty fee, according to the proposed settlement, Aylo would have to “implement a program” to prevent CSAM and non-consensual imagery from being disseminated on its sites, establish a system “to verify that people who appear in videos or photos on its websites are adults and have provided consent to the sexual conduct as well as its production and publication,” remove content uploaded before those programs until Aylo “verifies that the individuals participating in those videos were at least 18 at the time the content was created and consented to the sexual conduct and its production and publication,” post a notice on its website about the FTC and Utah’s allegations, and implement “a comprehensive privacy and information security program to address the privacy and security issues detailed in the complaint.”

Pornhub Is Now Blocked In Almost All of the U.S. South
As of today, three more states join the list of 17 that can’t access Pornhub because of age verification laws.
404 MediaSamantha Cole


Aylo already does much of this. Pornhub overhauled its content and moderation practices starting in 2020, after Visa, Mastercard and Discover stopped servicing the site and its network following allegations of CSAM and sex trafficking. It purged hundreds of thousands of videos from its sites in early 2020 and registered with the National Center for Missing and Exploited Children (NCMEC).

In 2024, Pornhub started requiring proof of consent from every single person who appeared in content on the platform.

“The resolution reached involved enhancements to existing measures but did not introduce any new substantive requirements that were not either already in place or in progress,” Aylo’s spokesperson said. “This settlement resolves the investigation and underscores Aylo's commitment to robust safety protocols that should be applied broadly across all websites publishing user generated content. Aylo supports vigorous enforcement against CSAM and NCM, and encourages the FTC and Utah DCP to extend their initiative to protect the public across the broader internet, adult and mainstream, fostering a safer online environment for everyone. Throughout the investigation, Aylo worked to cooperatively resolve the concerns raised by the FTC and Utah DCP.”

The complaint from Utah and the FTC focuses largely on content that appeared on Pornhub prior to 2020, and includes allegations against several of the 100 different websites owned by Alyo—then Mindgeek, prior to the company’s 2023 acquisition by Ethical Capital Partners—and its affiliates. For example, the complaint claims the website operators identified CSAM on the sites KeezMovies, SpankWire, and ExtremeTube with titles such as “Brunette Girl was Raped,” “Drunken passed out young niece gets a creampie,” “Amateur teen after party and fun passed out sex realty [sic] submissive,” “Girl getting gangraped,” and “Giving her a mouthful while she’s passed out drunk.”

“Rather than remove the videos, Defendants merely edited their titles to remove any suggestion that they contained CSAM or NCM. As a result, consumers continued to view and download these videos,” the complaint states. The FTC and Utah don’t specify in the complaint whether the people performing in those videos, or any of the videos mentioned, were actually adults participating in consensual roleplay scenarios or if the titles and tags were literal.

The discussions between then-Mindgeek compliance staff outlined in the complaint show some of the conversations moderators were allegedly having around 2020 about how to purge the site of unverified content. “A senior member of Defendants’ Compliance team stated in an internal email that ‘none of it is enough,’ ‘this is just a start,’ and ‘we need to block millions more’ because ‘the site is FULL of non-compliant content,’” the complaint states. “Another senior employee responded: ‘it’s over’ and ‘we’re fucked.’”

The complaint also mentions the Girls Do Porn sex-trafficking ring, which Pornhub hosted content for and acted as a Pornhub Premium partner until the ring was indicted on federal trafficking charges in 2019. In 2023, Pornhub reached a settlement with the US Attorney General’s office after an FBI investigation, and said it “deeply regrets” hosting that content.





"These AI videos are just repeating things that are on the internet, so you end up with a very simplified version of the past."#AI #AISlop #YouTube #History


One ROM: the Latest Incarnation of the Software Defined ROM


A hand holding a One ROM with a Commodore 64 in the background

Retrocomputers need ROMs, but they’re just so read only. Enter the latest incarnation of [Piers]’s One ROM to rule them all, now built with a RP2350, because the newest version is 5V capable. This can replace the failing ROMs in your old Commodore gear with this sweet design on a two-layer PCB, using a cheap microcontroller.

[Piers] wanted to use the RP2350 from the beginning but there simply wasn’t space on the board for the 23 level shifters which would have been required. But now that the A4 stepping adds 5 V tolerance [Piers] has been able to reformulate his design.

The C64 in the demo has three different ROMs: the basic ROM, kernel ROM, and character ROM. A single One ROM can emulate all three. The firmware is performance critical, it needs to convert requests on the address pins to results on the data bus just as fast as it can and [Piers] employs a number of tricks to meet these requirements.

The PCB layout for the RP2350 required extensive changes from the larger STM32 in the previous version. Because the RP2350 uses large power and ground pads underneath the IC this area, which was originally used to drop vias to the other side of the board, was no longer available for signal routing. And of course [Piers] is constrained by the size of the board needing to fit in the original form factor used by the C64.

The One ROM code is available over on GitHub, and the accompanying video from [Piers] is an interesting look into the design process and how tradeoffs and compromises and hacks are made in order to meet functional requirements.

youtube.com/embed/Zy8IMe6fMI4?…

Thanks to [Piers] for writing in to let us know about the new version of his project.


hackaday.com/2025/09/03/one-ro…



La Ricchezza di Illegio
freezonemagazine.com/articoli/…
Le vie dell’arte, come quelle del Signore, sono infinite e per vie intendo proprio quelle calpestabili, asfaltate, percorribili. Una di queste è in Carnia, regione interna al Friuli Venezia Giulia, dove il centro più grande è Tolmezzo e dal quale, in una manciata di minuti d’auto, si raggiunge il borgo di Illegio. Qui, dove […]
L'articolo La Ricchezza di Illegio proviene da FREE ZONE MAGAZINE.
Le vie


LockBit 5.0 : segnali di una nuova e possibile “Rinascita”?


LockBit rappresenta una delle più longeve e strutturate ransomware gang degli ultimi anni, con un modello Ransomware-as-a-Service (RaaS)che ha segnato in maniera profonda l’ecosistema criminale.

A seguito dell’operazione internazionale Operation Cronos, condotta a febbraio 2024 e che ha portato al sequestro di numerose infrastrutture e alla compromissione dei pannelli di gestione affiliati, il gruppo sembrava destinato a un declino irreversibile. Tuttavia, nelle ultime settimane, nuove evidenze in rete onion stanno alimentando ipotesi di una resurrezione del brand LockBit, sotto la sigla LockBit 5.0.

Breve storia del gruppo


  • 2019– Comparsa delle prime varianti di LockBit, caratterizzate da automatismi di propagazione rapida in ambienti Windows e tecniche avanzate di cifratura.
  • 2020-2021– Consolidamento del modello RaaS e forte espansione nella scena del cybercrime; introduzione dei data leak site come strumento di doppia estorsione.
  • 2022– LockBit diventa uno dei gruppi più attivi a livello globale, rilasciando le versioni LockBit 2.0 e 3.0, con implementazioni in linguaggi multipli e payload cross-platform.
  • 2023– Ulteriore diversificazione con payload in Go e Linux, e campagne mirate verso supply chain e settori critici.
  • 2024 (Operazione Cronos)– Coordinata da Europol e FBI, l’operazione porta al sequestro di oltre 30 server, domini onion e strumenti interni. Per la prima volta viene distribuito un decryptor pubblico su larga scala.


Evidenze recenti


Analizzando il loro sito underground, viene mostrato un portale accessibile tramite rete onion con brand LockBit 5.0, che adotta lo stesso schema di queue panel già osservato in precedenti versioni del gruppo. L’interfaccia ripropone loghi riconducibili a Monero (XMR), Bitcoin (BTC) e Zcash (ZEC) come metodi di pagamento, indicando che il modello di estorsione rimarrebbe centrato su criptovalute ad alto grado di anonimato.

Il messaggio“You have been placed in a queue, awaiting forwarding to the platform”richiama i meccanismi classici dei pannelli di affiliazione LockBit, dove l’utente (o affiliato) viene instradato verso il backend operativo.

Analisi tecnica e possibili scenari


L’apparizione di LockBit 5.0 può essere interpretata secondo tre scenari principali:

  1. Tentativo di resurrezione reale: una parte del core team non colpita da Operation Cronos potrebbe aver ricostruito un’infrastruttura ridotta, puntando a reclutare nuovamente affiliati.
  2. Operazione di inganno (honeypot): non si esclude la possibilità che si tratti di un’esca creata da ricercatori o forze dell’ordine per monitorare traffico e identificare affiliati superstiti.
  3. Rebranding opportunistico: attori terzi, approfittando del “marchio” LockBit, potrebbero riutilizzarlo per ottenere visibilità e autorevolezza immediata nella scena underground.


Conclusioni


Sebbene al momento non vi siano prove concrete di nuove compromissioni riconducibili a LockBit 5.0, la presenza di un portale onion con brand ufficiale alimenta speculazioni su una possibile rinascita del gruppo. Sarà cruciale monitorare:

  • eventuali nuove campagne di intrusione con TTP riconducibili al passato di LockBit,
  • leak site attivi con pubblicazione di vittime,
  • segnali di reclutamento nel dark web.

La vicenda dimostra ancora una volta la resilienza e la capacità di adattamento delle cyber-gang, che spesso riescono a rigenerarsi anche dopo operazioni di law enforcement di portata globale.

L'articolo LockBit 5.0 : segnali di una nuova e possibile “Rinascita”? proviene da il blog della sicurezza informatica.



Bonnie Dobson & The Hanging Stars – Dreams
freezonemagazine.com/articoli/…
Il disco che non ti aspetti. Questo è quello che continua a girarmi in testa nel corso degli ascolti, fattisi ripetuti degli ultimi giorni, di questa collaborazione fra la voce bellissima di Bobbie Dobson, canadese dai trascorsi in ambito eminentemente folk/rock, che pur oltrepassata la soglia delle ottantacinque primavere mantiene una capacità di ammaliare con […]



Trotz Trump: EU-Gericht gibt grünes Licht für transatlantischen Datenverkehr


netzpolitik.org/2025/trotz-tru…



United Healthcare CEO murder suspect Luigi Mangione is not, in fact, modeling floral button-downs for Shein.#LuigiMangione #shein #AI


Field Guide to North American Crop Irrigation


Human existence boils down to one brutal fact: however much food you have, it’s enough to last for the rest of your life. Finding your next meal has always been the central organizing fact of life, and whether that meal came from an unfortunate gazelle or the local supermarket is irrelevant. The clock starts ticking once you finish a meal, and if you can’t find the next one in time, you’ve got trouble.

Working around this problem is basically why humans invented agriculture. As tasty as they may be, gazelles don’t scale well to large populations, but it’s relatively easy to grow a lot of plants that are just as tasty and don’t try to run away when you go to cut them down. The problem is that growing a lot of plants requires a lot of water, often more than Mother Nature provides in the form of rain. And that’s where artificial irrigation comes into the picture.

We’ve been watering our crops with water diverted from rivers, lakes, and wells for almost as long as we’ve been doing agriculture, but it’s only within the last 100 years or so that we’ve reached a scale where massive pieces of infrastructure are needed to get the job done. Above-ground irrigation is a big business, both in terms of the investment farmers have to make in the equipment and the scale of the fields it turns from dry, dusty patches of dirt into verdant crops that feed the world. Here’s a look at the engineering behind some of the more prevalent methods of above-ground irrigation here in North America.

Crop Circles


Center-pivot irrigation machines are probably the most recognizable irrigation methods, both for their sheer size — center-pivot booms can be a half-mile long or more — and for the distinctive circular and semi-circular crop patterns they result in. Center-pivot irrigation has been around for a long time, and while it represents a significant capital cost for the farmer, both in terms of the above-ground machinery and the subsurface water supply infrastructure that needs to be installed, the return on investment time can be as low as five years, depending on the crop.
Pivot tower in an alfalfa field in Oregon. You can clearly see the control panel, riser pipe, swivel elbow, and the boom. The slip rings for electrical power distribution live inside the gray dome atop the swivel. Note the supporting arch in the pipe created by the trusses underneath. Source: Tequask, CC BY-SA 4.0.
Effective use of pivot irrigation starts with establishing a water supply to the pivot location. Generally, this will be at the center of a field, allowing the boom to trace out a circular path. However, semi-circular layouts with the water supply near the edge of the field or even in one corner of a square field are also common. The source must also be able to supply a sufficient amount of water; depending on the emitter heads selected, the boom can flow approximately 1,000 gallons per minute.

The pivot tower is next. It’s generally built on a sturdy concrete pad, although there are towable pivot machines where the center tower is on wheels. The tower needs to stand tall enough that the rotating boom clears the crop when it’s at its full height, which can be substantial for crops like corn. Like almost all parts of the machine, the tower is constructed of galvanized steel to resist corrosion and to provide a bit of anodic protection to the underlying metal.

The tower is positioned over a riser pipe that connects to the water supply and is topped by a swivel fitting to change the water flow from vertical to horizontal and to let the entire boom rotate around the tower. For electrically driven booms, a slip ring will also be used to transfer power and control signals from the fixed control panel on the tower along the length of the boom. The slip ring connector is located in a weather-tight enclosure mounted above the exact center of the riser pipe.

The irrigation boom is formed from individual sections of pipe, called spans. In the United States, each span is about 180 feet long, a figure that makes it easy to build a system that will fit within the Public Land Survey System (PLSS), a grid-based survey system based on even divisions called sections, one mile on a side and 640 acres in area. These are divided down into half-, quarter-, and finally quarter-quarter sections, which are a quarter mile on a side and cover 40 acres. A boom built from seven spans will be about 1,260 feet long and will be able to irrigate a 160-acre quarter-section, which is a half-mile on a side.

The pipe for each span is usually made from galvanized steel, but aluminum is also sometimes used. Because of the flow rates, large-diameter pipe is used, and it needs to be supported lest it sag when filled. To do this, the pipe is put into tension with a pair of truss rods that run the length of the span, connecting firmly to each end. The truss rods and the pipe are connected by a series of triangular trusses attached between the bottom of the pipe and the truss rods, bending the pipe into a gentle arch. The outer end of each span is attached to a wheeled tower, sized to support the pipe at the same height as the center tower. The boom is constructed by connecting spans to each other and to the center pivot using flexible elastomeric couplings, which allow each span some flexibility to adjust for the terrain of the field. Sprinkler heads (drops) are attached to the span by elbows that exit at the top of the pipe. These act as siphon breakers, preventing water from flowing out of the sprinkler heads once water flow in the boom stops.

Different sprinkler heads are typically used along the length of the boom, with lower flow rate heads used near the center pivot. Sprinkler heads are also often spaced further apart close to the pivot. Both of these limit the amount of water delivered to the field where the boom’s rotational speed is lower, to prevent crops at the center of the field from getting overwatered. Most booms also have an end gun, which is similar to the impulse sprinklers commonly used for lawn irrigation, but much bigger. The end gun can add another 100′ or more of coverage to the pivot, without the expense of another length of pipe. End guns are often used to extend coverage into the corners of square fields, to make better use of space that otherwise would go fallow. In this case, an electrically driven booster pump can be used to drive the end gun, but only when the controller senses that the boom is within those zones.
Many center-pivot booms have an end gun, which is an impulse sprinkler that extends coverage by 100 feet or more without having to add an extra span. They can help fill in the corners of square fields. Source: Ingeniero hidr., CC BY-SA 3.0.
Most center-pivot machines are electrically driven, with a single motor mounted on each span’s tower. The motor drives both wheels through a gearbox and driveshaft. In electrically driven booms, only the outermost span rotates continuously. The motors on the inboard spans are kept in sync through a position-sensing switch that’s connected to the next-furthest-out span through mechanical linkages. When the outboard span advances, it eventually trips a microswitch that tells the motor on the inboard span to turn on. Once that span catches up to the outboard span, the motor turns off. The result is a ripple of movement that propagates along the boom in a wave.
Electrically driven pivots use switches to keep each span in sync. The black cam is attached to the next-further span by a mechanical linkage, which operates a microswitch to run the motor on that span. Source: Everything About Irrigation Pivots, by SmarterEveryDay, via YouTube.
While electrically driven center-pivot machines are popular, they do have significant disadvantages. Enterprising thieves often target them for copper theft; half a mile of heavy-gauge, multi-conductor cable sitting unattended in a field that could take hours for someone to happen upon is a tempting target indeed. To combat this, some manufacturers use hydrostatic drives, with hydraulic motors on each wheel and a powerful electric- or diesel-driven hydraulic pump at the pivot. Each tower’s wheels are controlled by a proportioning valve connected to the previous span via linkages, to run the motors faster when the span is lagging behind the next furthest-out tower.

Aside from theft deterrence, hydrostatic-drive pivots tend to be mechanically simpler and safer to work on, although it’s arguable that the shock hazard from the 480 VAC needed for the motors on electrically driven pivots is any less dangerous than hydraulic injection injuries from leaks. Speaking of leaks, hydrostatic pivots also pose an environmental hazard that electric rigs don’t; a hydraulic leak could potentially contaminate an entire field. To mitigate that risk, hydrostatic pivots generally use a non-toxic hydraulic fluid specifically engineered for pivots.

Occasionally, you’ll see center-pivot booms in fields that aren’t circular. Some rectangular fields can be irrigated with pivot-style booms that are set up with drive wheels at both ends. These booms travel up and down the length of a field with all motors running at the same speed. Generally, water is supplied via a suction hose dipping down from one end of the boom into an irrigation ditch or canal running alongside the field. At the end of the field, the boom reverses and heads back down the way it came. Alternatively, the boom can pivot 180 degrees at the end of the field and head back to the other end, tracing out a racetrack pattern. There are also towers where the wheels can swivel rather than being fixed perpendicularly to the boom; this setup allows individual spans or small groups to steer independently of the main boom, accommodating odd-shaped fields.
While pivot-irrigation is labor-efficient, it leaves quite a bit of land fallow. Many of these pivots use the end gun to get a few extra rows in each of the corner quadrants, increasing land use. Source: go_turk06, via Adobestock.

Rolling, Rolling, Rolling


While center-pivot machines are probably the ultimate in above-ground irrigation, they’re not perfect for every situation. They’re highly automated, but at great up-front cost, and even with special tricks, it’s still not possible to “square the circle” and make use of every bit of a rectangular field. For those fields, a lower-cost method like wheel line irrigation might be used. In this setup, lengths of pipe are connected to large spoked wheels about six feet in diameter. The pipe passes through the center of the wheel, acting as an axle. Spans of pipe are connected end-to-end on either side of a wheeled drive unit, forming a line the width of the field, up to a quarter-mile long, with the drive unit at the center of the line.
Wheel-line system in action on alfalfa in British Columbia. The drive unit at the center powers the whole string, moving it across the field a few times a day. It’s far more labor-intensive than a pivot, but far cheaper. Source: nalidsa, via Adobestock.
In use, the wheel line is rolled out into the field about 25 feet from the edge. When the line is in position, one end is connected to a lateral line installed along the edge of the field, which typically has fittings every 50 feet or so, or however far the sprinkler heads that are attached at regular intervals to the pipe cover. The sprinklers are usually impulse-type and attached to the pipe by weighted swivel fittings, so they always remain vertical no matter where the line stops in its rotation. The heads were traditionally made of brass or bronze for long wear and corrosion resistance, but thieves attracted to them for their scrap value have made plastic heads more common.

Despite their appearance, wheel lines do not continually move across the field. They need to be moved manually, often several times a day, by running the drive unit at the center of the line. This is generally powered by a small gasoline engine which rotates the pipe attached to either side, rolling the entire string across the field as a unit. Disconnecting the water, rolling the line, and reconnecting the line to the supply is quite labor-intensive, so it tends to be used only where labor is cheap.

Reeling In The Years


A method of irrigation that lives somewhere between the labor-intensive wheel line and the hands-off center-pivot is hose reel irrigation. It’s more commonly used for crop irrigation in Europe, but it does make an occasional appearance in US agriculture, particularly in fields where intensive watering all season long isn’t necessary.

As the name suggests, hose reel irrigation uses a large reel of flexible polyethylene pipe, many hundreds of feet in length. The reel is towed into the field, typically positioned in the center or at its edge. Large spades on the base of the reel are lowered into the ground to firmly anchor the reel before it’s connected to the water supply via hoses or pipes. The free end of the hose reel is connected to a tower-mounted gun, which is typically a high-flow impulse sprinkler. The gun tower is either wheeled or on skids, and a tractor is used to drag it out into the field away from the reel. Care is taken to keep the hose between rows to prevent damage to the crops.

Once the water is turned on, water travels down the hose and blasts out of the gun tower, covering a circle or semi-circle a hundred feet or more in diameter. The water pressure also turns a turbine inside the hose reel, which drives a gearbox that slowly winds the hose back onto the reel through a chain and sprocket drive. As the hose retracts, it pulls the gun back to the center of the field, evenly irrigating a large rectangular swath of the field. Depending on how the reel is set up, it can take a day or more for the gun to return to the reel, where an automatic shutoff valve shuts off the flow of water. The setup is usually moved to another point further down the field and the process is repeated until the whole field is irrigated.
Hose reel system being deployed for potatoes in Maine. The end gun on the right is about to be towed into the field, pulling behind it the large-diameter hose from the reel. The reel’s turbine and gearbox will wind the hose back up, pulling the gun in over a day or two. Source: Irrigation Hustle Continues, Bell’s Farming, via YouTube.
Although hose reels still need tending to, they’re nowhere near as labor-intensive as wheel lines. Farmers can generally look in on a reel setup once a day to make sure everything is running smoothly, and can often go several days between repositioning. Hose reels also have the benefit of being much easier to scale up and down than either center-pivot machines or wheel line; there are hose reels that store thousands of feet of large-diameter hose, and ones that are small enough for lawn irrigation that use regular garden hose and small impulse sprinklers.


hackaday.com/2025/09/03/field-…



Glaciers in Central Asia have remained intact even as other parts of the world have seen rapid glacial loss. A new study shows that may be changing.#TheAbstract


They Were Some of Earth’s Last Stable Glaciers. Now, They’re Melting.


🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.

Scientists have long been puzzled by the sturdy glaciers of the mountains of central Asia, which have inexplicably remained intact even as other glaciers around the world rapidly recede due to human-driven climate change. This mysterious resilience may be coming to an end, however.

The glaciers in this mountainous region—nicknamed the “Third Pole” because it boasts more ice than any place outside of the Arctic and Antarctic polar caps— have passed a tipping point that could set them on a path to accelerated mass loss, according to a new study. The end of this unusual glacial resilience, known as the Pamir-Karakoram Anomaly, would have major implications for the people who rely on the glaciers for water.

Scientists suggested that a recent decline in snowfall to the region is behind the shift, but it will take much more research to untangle the complicated dynamics of these remote and under-studied glaciers, according to a study published on Tuesday in Communications Earth & Environment.

“We have known about this anomaly since the early 2000s,” said study co-author Francesca Pellicciotti, a professor at the Institute of Science and Technology Austria (ISTA), in a call with 404 Media. “In the last 25 years, remote-sensing has really revolutionized Earth sciences in general, and also cryospheric sciences.”

“There is no definite answer yet for why those glaciers were quite stable,” said Achille Jouberton, a PhD student at ISTA who led the study, in the same call. “On average, at the regional scale, they were doing quite well in the last decade—until recently, which is what our study is showing.”

This space-down view of the world’s glaciers initially revealed the resilience of ice and snowpack in the Pamir-Karakoram region, but that picture started to change around 2018. Many of these glaciers have remained inaccessible to scientists due to political instabilities and other factors, leaving a multi-decade gap in the research about their curious strength.

To get a closer look, Jouberton and his colleagues established a site for monitoring snowfall, precipitation, and water resources at Kyzylsu Glacier in central Tajikistan in 2021. In addition to this fieldwork, the team developed sophisticated models to reconstruct changes within this catchment since 1999.

While the glaciers still look robust from the outside, the results revealed that snowfall has decreased and ice melt has increased. These interlinked trends have become more pronounced over the past seven years and were corroborated by conversations with locals. The decline in precipitation has made the glacier vulnerable to summer melting, as there is less snowpack to protect it from the heat.

“It will take a while before these glaciers start looking wasted, like the glaciers of the Alps, or North America, or South America,” said Pellicciotti.

While the team pinpointed a lack of snowfall as a key driver of the shift, it’s unclear why the region is experiencing reduced precipitation. The researchers are also unsure if a permanent threshold has been crossed, or if these changes could be chalked up to natural variation. They hope that the study, which is the first to warn of this possible tipping point, will inspire climate scientists, atmospheric scientists, and other interdisciplinary researchers to weigh in on future work.

“We don't know if this is just an inflection in the natural cycle, or if it's really the beginning of a trend that will go on for many years,” said Pellicciotti. “So we need to expand these findings, and extend them to a much longer period in the past and in the future.”

Resolving these uncertainties will be critical for communities in this region that rely on healthy snowpack and ice cover for their water supply. It also hints that even the last stalwart glacial holdouts on Earth are vulnerable to climate change.

“The major rivers are fed by snow and glacier melts, which are the dominant source of water in the summer months, which makes the glaciers very important,” concluded Jouberton. "There’s a large amount of people living downstream in all of the Central Asian countries that are really direct beneficiaries of those water and meltwater from the glaciers.”

🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.




Il RE dei DDoS! Cloudflare blocca un attacco mostruoso da 11,5 terabit al secondo


Il record per il più grande attacco DDoS mai registrato nel giugno 2025 è già stato battuto. Cloudflare ha dichiarato di aver recentemente bloccato il più grande attacco DDoS della storia, che ha raggiunto il picco di 11,5 Tbps.

“Le difese di Cloudflare sono operative senza sosta. Nelle ultime settimane abbiamo bloccato centinaia di attacchi DDoS iper-volume, il più grande dei quali ha raggiunto un picco di 5,1 miliardi di pacchetti al secondo e 11,5 Tbps”, ha affermato Cloudflare.

Secondo l’azienda, l’attacco è stato un flood UDP proveniente da diversi provider cloud e IoT, tra cui Google Cloud. I rappresentanti di Cloudflare hanno detto di voler pubblicare un rapporto dettagliato sull’incidente nel prossimo futuro. Secondo un’immagine allegata al comunicato dell’azienda, l’attacco da record è durato solo circa 35 secondi.

Ricordiamo che il record precedente era stato stabilito a giugno di quest’anno. In quell’occasione, Cloudflare aveva comunicato di aver neutralizzato un attacco DDoS rivolto a un provider di hosting non identificato, la cui potenza di picco aveva raggiunto i 7,3 Tbit/s.

Questo attacco è stato superiore del 12% rispetto al precedente record di 5,6 Tbps, stabilito nel gennaio 2025.

All’epoca, gli esperti scrissero che un’enorme quantità di dati veniva trasferita in soli 45 secondi: 37,4 TB. Ciò equivale a circa 7.500 ore di streaming HD o al trasferimento di 12.500.000 di foto JPEG.

Nel suo rapporto del primo trimestre del 2025 , Cloudflare ha dichiarato di aver bloccato un totale di 21,3 milioni di attacchi DDoS contro i suoi clienti lo scorso anno, oltre a più di 6,6 milioni di attacchi all’infrastruttura aziendale stessa.

L'articolo Il RE dei DDoS! Cloudflare blocca un attacco mostruoso da 11,5 terabit al secondo proviene da il blog della sicurezza informatica.

Gazzetta del Cadavere reshared this.



L’IA crescerà del 50% e anche la tua ansia per la bolletta della luce


Il settore globale dei data center si sta preparando a un forte aumento delle piattaforme di elaborazione per le richieste di intelligenza artificiale. Secondo Goldman Sachs, la capacità installata dei data center crescerà di circa il 50% entro il 2027 e il consumo di elettricità raddoppierà entro il 2030. Allo stesso tempo, gli analisti affermano esplicitamente di monitorare attentamente i segnali di surriscaldamento: l’adozione di massa dell’IA potrebbe essere inferiore alle attuali aspettative se la monetizzazione non dovesse funzionare o se emergessero innovazioni più economiche che renderebbero i modelli un prodotto di base.

Attualmente, la capacità globale dei data center è di circa 62 GW. I carichi di lavoro cloud rappresentano il 58%, i carichi di lavoro aziendali tradizionali il 29% e l’intelligenza artificiale il 13%. A titolo di confronto, all’inizio del 2023, il segmento delle attività generative e di formazione era quasi invisibile. Nelle previsioni per il 2027, la situazione cambia: l’intelligenza artificiale occuperà circa il 28% della capacità totale, il cloud il 50% e i carichi di lavoro classici il 21%. Non si tratta del declino dei segmenti classici, ma della crescita più rapida dell’intelligenza artificiale all’interno della torta complessiva in crescita.

L’ondata di investimenti è confermata da stime di terze parti. Secondo Omdia, gli investimenti di capitale nei data center sono paragonabili a quelli delle economie di medie dimensioni. Amazon da sola spende oltre 100 miliardi di dollari all’anno, una cifra paragonabile al PIL della Costa Rica. Counterpoint Research prevede che entro il 2030 il fatturato dell’industria dei semiconduttori potrebbe raddoppiare dal 2024 a oltre 1.000 miliardi di dollari, principalmente grazie all’acquisto di infrastrutture server avanzate per applicazioni di intelligenza artificiale. L’impulso più potente proviene dagli hyperscaler, e questo vale sia per i prossimi anni che per un orizzonte temporale più lungo. Un altro fattore trainante è la cosiddetta token economy: generare enormi volumi di token in scenari di intelligenza artificiale basata su agenti richiede un aumento multiplo dell’hardware.

Il cambiamento di scala è chiaramente visibile nelle configurazioni. Se due anni fa i server di punta erano dotati di otto acceleratori GPU, entro il 2027 i rack più diffusi monteranno fino a 576 processori grafici in un case delle dimensioni di un cabinet. Un modulo di questo tipo richiederà circa 600 kW, sufficienti a fornire energia a circa 500 famiglie statunitensi. Questi cluster impongono requisiti rigorosi per l’alimentazione e il raffreddamento e modificano anche la pianificazione delle aree: non è più sufficiente acquistare rack aggiuntivi; è necessaria una profonda riconfigurazione dei sistemi energetici e ingegneristici.

Le conseguenze energetiche del ridimensionamento sono prevedibili ma tangibili. Entro il 2030, il consumo totale dei data center, secondo Goldman Sachs, crescerà a livello globale del 165%: la quota del settore nel consumo globale di elettricità salirà dall’1-2% nel 2023 al 3-4% entro la fine del decennio. Si propone di colmare il carico aggiuntivo in modo misto. Si prevede che le fonti rinnovabili copriranno circa il 40% dell’aumento, una limitata espansione della generazione nucleare sarà specificamente indirizzata ai carichi di intelligenza artificiale e il restante 60% sarà fornito dalle stazioni di servizio. Queste ultime aggiungeranno, secondo i calcoli, 215-220 milioni di tonnellate di emissioni di gas serra entro il 2030, ovvero circa lo 0,6% in più alle emissioni energetiche globali.

La banca sottolinea che, nonostante la solidità del ciclo di investimenti, permangono dei rischi. Tra i principali, vi sono i tentativi falliti di recuperare i servizi di intelligenza artificiale, le innovazioni tecnologiche che riducono radicalmente i costi di formazione e inferenza e, di conseguenza, la mercificazione dei modelli, che può ridurre i premi sui cluster ad alte prestazioni. In questo scenario, anche la crescita della capacità e del consumo energetico rallenterà.

Per ora, la bilancia è a favore dell’accelerazione: la quota di IA nei data center sta crescendo da zero a una quota significativa del mercato nel giro di pochi anni, gli hyperscaler stanno riservando intere unità di potenza per applicazioni future e i produttori di chip stanno pianificando un fatturato di mille miliardi di dollari. Il prezzo da pagare per questa corsa è la ristrutturazione dell’infrastruttura energetica del pianeta e la necessità di introdurre rapidamente nuovi megawatt senza perdere di vista l’impronta di carbonio. È qui, secondo gli analisti, che verrà tracciata la linea di demarcazione tra le strategie degli attori: chi riuscirà a coniugare velocità di implementazione, costi di elaborazione e sostenibilità del mix energetico definirà il tono del mercato per il prossimo decennio.

L'articolo L’IA crescerà del 50% e anche la tua ansia per la bolletta della luce proviene da il blog della sicurezza informatica.



How Trump's tariffs are impacting all sorts of hobbies; how OnlyFans piracy is ruining the internet for everyone; and ChatGPT's reckoning.

How Trumpx27;s tariffs are impacting all sorts of hobbies; how OnlyFans piracy is ruining the internet for everyone; and ChatGPTx27;s reckoning.#Podcast


Podcast: Trump Take LEGO


We start this week with our articles about Trump’s tariffs, and how they’re impacting everything from LEGO to cameras to sex toys. After the break, Emanuel explains how misfired DMCA complaints designed to help adult creators are targeting other sites, including ours. In the subscribers-only section, we do a wrap-up of a bunch of recent ChatGPT stories about suicide and murder. A content warning for suicide and self-harm for that section.
playlist.megaphone.fm?e=TBIEA2…
Listen to the weekly podcast on Apple Podcasts,Spotify, or YouTube. Become a paid subscriber for access to this episode's bonus content and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.
youtube.com/embed/srdUOWq_hfg?…