Salta al contenuto principale



“In the other person there is a brother, a sister!”, writes Pope Leo XIV addressing young people worldwide in his message for the 40th World Youth Day, to be celebrated at the diocesan level on November 23 this year with the theme: “You also are my w…


EU-Überwachungspläne: Unionsfraktion jetzt gegen Chatkontrolle, Innenministerium will sich nicht äußern


netzpolitik.org/2025/eu-ueberw…



2025 Hackaday Supercon: More Wonderful Speakers


Supercon is just around the corner, and we’re absolutely thrilled to announce the second half of our slate! Supercon will sell out so get your tickets now before it’s too late. If you’re on the fence, we hope this pushes you over the line. And if it doesn’t, stay tuned — we’ve still got to tell you everything about the badge and the fantastic keynote speaker lineup.

(What? More than one keynote speaker? Unheard of!)

And as if that weren’t enough, there’s delicious food, great live music, hot soldering irons, and an absolutely fantastic crowd of the Hackaday faithful, and hopefully a bunch of new folks too. If you’re a Supercon fan, we’re looking forward to seeing you again, and if it’s your first time, we’ll be sure to make you feel welcome.

Amie Dansby and Karl Koscher
Hands-On Hardware: Chip Implants, Weird Hacks, and Questionable Decisions

What happens when your body is the dev board? Join Amie Dansby, who’s been living with four biochip implants for years, and Karl Koscher as they dive into the wild world of biohacking, rogue experiments, and deeply questionable decisions in the name of science, curiosity, and chaos.

Arsenio Menendez
Long Waves, Short Talk: A Practical IR Spectrum Guide

Whether you’re a seasoned sensor engineer or a newcomer join us in exploring the capabilities of SWIR, MWIR, and LWIR infrared bands. Learn how each wavelength range enables enhanced vision across a variety of environments, as well as how the IR bands are used in surveillance, industrial inspection, target tracking, and more.

Daniel [DJ] Harrigan
Bringing Animatronics to Life

This talk explores the considerations behind designing a custom Waldo/motion capture device that allows him to remotely puppet a complex animatronic with over twenty degrees of freedom. We’ll discuss the electrical, mechanical, and software challenges involved in creating a responsive, robust remote controller.

Daryll Strauss
Covert Regional Communication with Meshtastic

Learn how Meshtastic uses low-cost LORA radios to build ad hoc mesh networks for secure, decentralized communication. We’ll cover fundamentals, hardware, configuration tips, and techniques to protect against threats, whether for casual chats, data sharing, or highly covert group communication.

Allie Katz and SJ Jones
Fireside Chat: Metal 3D Printing … in space?!

Metal 3D Printing … in space?! SJ Jones is an additive manufacturing solutions engineer and nobody knows metal printing for intense applications like they do. In this discussion they’ll be talking with designer and 3D printing expert Allie Katz about computational design, artful engineering, and 3D prints that can survive a rocket trip.

Davis DeWitt
Movie Magic and the Value of Practical Effects

What does it take to create something that’s never been seen before? In film and TV, special effects must not only work, but also feel alive. This talk explores how blending hardware hacking with art creates functional and emotional storytelling, from explosive stunts to robots with personality, these projects blur the lines between disciplines.

Aaron Eiche
The Magic of Electropermanent Magnets!

Electropermanent magnets are like magic, an electromagnet but permanently switchable with a bit of current and a few microseconds. Aaron shares the adventures in using cheap off-the-shelf components to build his own and how to make them work empirically.

Fangzheng Liu
CircuitScout: Probing PCBs the Easy Way

Debugging PCBs can be challenging and time-consuming. This talk dives into the open-source DIY project, CircuitScout. This small desktop machine system automates debugging by selecting pads from your schematic, locating them, and controlling a probe machine for safe, hands-free testing.

Joe Needleman
From Sunlight to Silicon

AI workloads consume significant energy, but what if it didn’t? This hands-on session shows how to design and run a solar-powered computer cluster, focusing on NVIDIA Jetson Orin hardware, efficient power pipelines, and software strategies for high performance under tight energy limits.

John Duffy
The Circuits Behind Your Multimeter

Everyone uses a multimeter, but do you know what’s inside? This talk explores the inner workings, plus insights from building one, the design choices, and the tradeoffs behind common models. Discover the hidden engineering that makes this everyday tool accurate, safe, and reliable.

Josh Martin
DIY Depth: Shooting and Printing 3D Images

3D photography isn’t just for vintage nerds or high-end tech! Learn how stereoscopic film cameras work, the mechanics of lenticular lenses and how to print convincing 3D images at home, plus dive into digitizing, aligning, and processing 3D images from analog sources.

Kay Antoniak
From bytes to bobbins: Driving an embroidery machine

This talk explores how an embroidery machine brings out the best of tinkering: production, customization, and creative hacks. Learn how to run your first job on that dusty makerspace machine, create your own patch using open-source tools, and see what extra capabilities lie beyond the basics.

Keith Penney
Ghostbus: Simpler CSR Handling in Verilog

Designing FPGA applications means wrangling CSRs and connecting busses, a tedious & error-prone task. This talk introduces Ghostbus, an approach that automates address assignment and bus routing entirely in Verilog to keep designs clean, maintainable, and functional.

Kumar Abhishek
Laser ablating PCBs

Once too expensive, PCB fabrication via laser ablation of copper is now accessible via commodity fiber laser engravers. This talk shares experiences in making boards using this chemical-free technique and how it can help in rapid prototyping.

Karl Koscher
rtlsdr.tv: Broadcast TV in your browser

This talk introduces rtlsdr.tv and will cover the basics of digital video streams, programmatically feeding live content to video through Media Source Extensions, and using WebUSB to interact with devices that previously required kernel drivers.

If you’re still here, get your tickets!


hackaday.com/2025/10/07/2025-h…



Renault e Dacia: violazione dati personali clienti UK


I clienti britannici di Renault e Dacia sono stati informati di una violazione dei dati personali. La violazione, secondo quanto riferito, si è verificata presso un fornitore terzo.

La casa automobilistica francese (Dacia è una sussidiaria di Renault), che impiega oltre 170.000 persone e produce 2,2 milioni di veicoli all’anno, ha riferito che la perdita ha interessato solo i clienti delle sue divisioni nel Regno Unito. Ha sottolineato che l’incidente era collegato a un “appaltatore terzo” non identificato e che i sistemi di Renault non erano stati interessati.

“Siamo spiacenti di informarvi che uno dei nostri partner è stato vittima di un attacco informatico, che ha causato il furto di dati personali di alcuni clienti Renault UK”, ha affermato l’azienda in una nota.

Tra i dati compromessi caduti nelle mani degli hacker rientrano:

  • nome e cognome;
  • pavimento;
  • numero di telefono;
  • indirizzo e-mail;
  • indirizzo postale;
  • Codice VIN del veicolo;
  • numero di registrazione.

Questo set di dati potrebbe essere utilizzato da aggressori per attacchi di phishing, frodi e ingegneria sociale. Renault sottolinea che le informazioni bancarie e finanziarie dei clienti non sono state compromesse.

L’azienda aggiunge che l’appaltatore interessato ha contenuto l’incidente ed eliminato la minaccia sulle sue reti. Le autorità di regolamentazione britanniche, tra cui l’Information Commissioner’s Office (ICO), sono già state informate dell’attacco informatico.

Si consiglia ai clienti di prestare attenzione, di non rispondere a chiamate o e-mail sospette e di non condividere le proprie password con nessuno.

L'articolo Renault e Dacia: violazione dati personali clienti UK proviene da il blog della sicurezza informatica.




Puglia, Fnsi e Assostampa al fianco di Marilù Mastrogiovanni


@Giornalismo e disordine informativo
articolo21.org/2025/10/puglia-…
Calvario giudiziario infinito per la giornalista pugliese Marilù Mastrogiovanni, direttrice del giornale d’inchiesta ‘Il Tacco d’Italia’. A seguito dell’omicidio del boss Augustino Potenza



Noi non rischiamo di assuefarci


@Giornalismo e disordine informativo
articolo21.org/2025/10/noi-non…
«È diritto di chi è attaccato difendersi, ma anche la legittima difesa deve rispettare il parametro della proporzionalità. Purtroppo, la guerra che ne è scaturita ha avuto conseguenze disastrose e disumane. Mi colpisce e mi affligge il conteggio quotidiano dei morti in



se durante lo shutdown trump licenzia la metà dei dipendenti, la causa del licenziamento è lo shutdown o trump? a me sembra trump. come può esserci ambiguità su questo? io non lo capisco... ricordo che lo shutdown non comporta il licenziamento...


Ecco il programma della decima edizione di JAZZMI
freezonemagazine.com/news/ecco…
Nel 2025, JAZZMI celebra il suo decimo anniversario, un traguardo significativo che ne conferma il ruolo di riferimento per il jazz a Milano e oltre. In dieci anni, il festival ha trasformato un’idea in un progetto culturale stabile, riconosciuto a livello nazionale e internazionale, capace di raccontare il jazz nella sua dimensione più ampia, dinamica […]


"Il Patriarcato Ecumenico esprime la sua gioia per la prossima visita di Sua Santità Papa Leone XIV di Roma in Turchia, in risposta al desiderio espresso e all'invito di Sua Santità il Patriarca Ecumenico Bartolomeo di commemorare insieme lo storico …


"Trasmettere con gioia ai vostri figli e alle nuove generazioni i valori cristiani che hanno plasmato la vostra lunga storia e la vostra cultura".


Pirates win 18 seats in Czech parliament!


Congratulations to the Czech Pirates for their win in the October 3-4th parliamentary election. They went from four seats in the 2021 election when they were part of the Pirates and Mayors (STAN) alliance to eighteen seats in this election in alliance with the Greens. The Greens will get two of the eighteen seats.

The Czech Pirates are an inspiration to Pirates in the United States and around the world. They, like Pirates in Luxembourg are in their country’s legislatures and continue to fight for Pirate policies there.


masspirates.org/blog/2025/10/0…



Bypassing Sora 2's rudimentary safety features is easy and experts worry it'll lead to a new era of scams and disinformation.

Bypassing Sora 2x27;s rudimentary safety features is easy and experts worry itx27;ll lead to a new era of scams and disinformation.#News #AI


Sora 2 Watermark Removers Flood the Web


Sora 2, Open AI’s new AI video generator, puts a visual watermark on every video it generates. But the little cartoon-eyed cloud logo meant to help people distinguish between reality and AI-generated bullshit is easy to remove and there are half a dozen websites that will help anyone do it in a few minutes.

A simple search for “sora watermark” on any social media site will return links to places where a user can upload a Sora 2 video and remove the watermark. 404 Media tested three of these websites, and they all seamlessly removed the watermark from the video in a matter of seconds.
playlist.megaphone.fm?p=TBIEA2…
Hany Farid, a UC Berkeley professor and an expert on digitally manipulated images, said he’s not shocked at how fast people were able to remove watermarks from Sora 2 videos. “It was predictable,” he said. “Sora isn’t the first AI model to add visible watermarks and this isn’t the first time that within hours of these models being released, someone released code or a service to remove these watermarks.”
youtube.com/embed/QvkJlMWUUxU?…
Hours after its release on September 30, Sora 2 emerged as a copyright violation machine full of Nazi SpongeBobs and criminal Pickachus. Open AI has tamped down on that kind of content after the initial thrill of seeing Rick and Morty shill for crypto sent people scrambling to download the app. Now that the novelty is wearing off we’re grappling with the unpleasant fact that Open AI’s new tool is very good at making realistic videos that are hard to distinguish from reality.

To help us all from going mad, Open AI has offered watermarks. “At launch, all outputs carry a visible watermark,” Open AI said in a blog post. “All Sora videos also embed C2PA metadata—an industry-standard signature—and we maintain internal reverse-image and audio search tools that can trace videos back to Sora with high accuracy, building on successful systems from ChatGPT image generation and Sora 1.”

But experts say that those safeguards fall short. “A watermark (visual label) is not enough to prevent persistent nefarious users attempting to trick folks with AI generated content from Sora,” Rachel Tobac, CEO of SocialProof Security, told 404 Media.

Tobac also said she’s seen tools that dismantle AI-generated metadata by altering the content’s hue and brightness. “Unfortunately we are seeing these Watermark and Metadata Removal tools easily break that standard,” Tobac said of the C2PA metadata. “This standard will still work for less persistent AI slop generators, but will not stop dedicated bad actors from tricking people.”

As an example of how much trouble we’re in, Tobac pointed to an AI-generated video that went viral on TikTok over the weekend she called “stranger husband train.” In the video, a woman riding the subway cutely proposes marriage to a complete stranger sitting next to her. He accepts. One instance of the video has been liked almost 5 million times on TikTok. It didn’t have a watermark.

“We're already seeing relatively harmless AI Sora slop confusing even the savviest of Gen Z and Millennial users,” Tobac said. “With many typically-savvy commenters naming how ‘cooked’ we are because they believed it was real. This type of viral AI slop account will attempt to make as much money from the creator fund as possible before social media companies learn they need to invest in detecting and limiting AI slop, before their platform succumbs to the Slop Fest.”

But it’s not just the slop. It’s also the scams. “At its most innocuous, AI generated content without watermarking and metadata accelerates the enshittification of the internet and tricks people with inflammatory content,” Tobac said. “At its most malignant, AI generated content without watermarking and metadata could lead to every day people losing their savings in scams, becoming even more disenfranchised during election season, could tank a stock price within a few hours, could increase the tension between differing groups of people, and could inspire violence, terrorism, stampede or panic amongst everyday folks.”

Tobac showed 404 Media a few horrifying videos to illustrate her point. In one, a child pleads with their parents for bail money. In another, a woman tells the local news she’s going home after trying to vote because her polling place was shut down. In a third, Sam Altman tells a room that he can no longer keep Open AI afloat because the copyright cases have become too much to handle. All of the videos looked real. None of them have a watermark.

“All of these examples have one thing in common,” Tobac said. “They’re attempting to generate AI content for use off Sora 2’s platform on other social media to create mass or targeted confusion, harm, scams, dangerous action, or fear for everyday folk who don’t understand how believable AI can look now in 2025.”

Farid told 404 Media that Sora 2 wasn’t uniquely dangerous. It’s just one among many. “It is part of a continuum of AI models being able to create images and video that are passing through the uncanny valley,” he said. “Having said that, both Veo 3 and Sora 2 are big steps in our ability to create highly visual compelling videos. And, it seems likely that the same types of abuses we’ve seen in the past will be supercharged by these new powerful tools.”

According to Farid, Open AI is decent at employing strategies like watermarks, content credentials, and semantic guardrails to manage malicious use. But it doesn’t matter. “It is just a matter of time before someone else releases a model without these safeguards,” he said.

Both Tobac and Farid said that the ease at which people can remove watermarks from AI-generated content wasn’t a reason to stop using watermarks. “Using a watermark is the bare minimum for an organization attempting to minimize the harm that their AI video and audio tools create,” Tobac said, but she thinks the companies need to go further. “We will need to see a broad partnership between AI and Social Media companies to build in detection for scams/harmful content and AI labeling not only on the AI generation side, but also on the upload side for social media platforms. Social Media companies will also need to build large teams to manage the likely influx of AI generated social media video and audio content to detect and limit the reach for scammy and harmful content.”

Tech companies have, historically, been bad at that kind of moderation at scale.

“I’d like to know what OpenAI is doing to respond to how people are finding ways around their safeguards,” Farid said. “We are seeing, for example, Sora not allowing videos that reference Hitler in the prompt, but then users are finding workarounds by simply describing what Hitler looks like (e.g., black hair, black military outfit and a Charlie Chaplin mustache.) Will they adapt and strengthen their guardrails? Will they ban users from their platforms? If they are not aggressive here, then this is going to end badly for us all.”

Open AI did not respond to 404 Media’s request for comment.


#ai #News #x27


Court records show that the narrative Flock and a Texas Sheriff's Office has told the public isn't the whole story, and that police were conducting a 'death investigation' into the abortion.

Court records show that the narrative Flock and a Texas Sheriffx27;s Office has told the public isnx27;t the whole story, and that police were conducting a x27;death investigationx27; into the abortion.#Flock #Abortion


Police Said They Surveilled Woman Who Had an Abortion for Her 'Safety.' Court Records Show They Considered Charging Her With a Crime


In May, 404 Media reported that the Johnson County Sheriff’s Office in Texas searched a nationwide network of Flock cameras, a powerful AI-enabled license plate surveillance tool, to look for a woman who self-administered an abortion. At the time, the sheriff told us that the search had nothing to do with criminality and that they were concerned solely about the woman’s safety, specifically the idea that she could be bleeding to death from the abortion. Flock itself said “she was never under criminal investigation by Johnson County. She was being searched for as a missing person, not as a suspect of a crime.”

But newly unearthed court documents about the incident show that when the search was performed, police were conducting a “death investigation” into the death of the fetus, and police discussed whether they could charge the woman with a crime with the District Attorney’s office on the same day that they performed the Flock search. The documents, obtained by the Electronic Frontier Foundation (EFF) and shared with 404 Media, also show that the Flock search was performed more than two weeks after the woman had the abortion. The documents were created as part of an arrest affidavit against the woman’s partner, who was arrested for allegedly abusing and threatening her at gunpoint on the day she took the abortion pill.

In documents created prior to the publication of our article, there is zero mention of concern about the woman’s safety. The records show that the police retroactively created a separate document about the Flock search a week after our article was published, in which they justify the search by saying they were concerned for her safety.

404 Media’s initial reporting on the incident became national news, has been cited in several government investigations into how Flock is used by police, and has led to several reforms by Flock itself. The company and its CEO, Garrett Langley, have repeatedly used it as a high-profile example of an ‘activist’ media that is biased against his company. The documents show that the narrative pushed by the Johnson County Sheriff’s Office and repeated by Flock is not the full story, and that police did consider charging the woman with a crime.

“For months, Flock Safety and the Johnson County Sheriff insisted that she was being searched for as a missing person and accused journalists and advocates of spreading 'clickbait' misinformation,” Rin Alajaji, legislative activist at the EFF, told 404 Media. “Now we have the official records, and they prove the exact opposite: Texas deputies did investigate this woman's abortion as a ‘death investigation,’ they did use Flock Safety’s ALPR network to track her down, and they did consult prosecutors about charging her. The only misinformation came from the company and the sheriff trying to cover their tracks. We’ve warned about this for over a decade now: when a single search can access more than 83,000 cameras across nearly the entire country, the potential for abuse is enormous. This makes it crystal clear that neither the companies profiting from this technology nor the agencies deploying it can be trusted to tell the full story about how it's being used.”

The documents highlight how Flock, whose cameras are installed in thousands of communities around the country, and which 404 Media has revealed police use on behalf of ICE, ultimately may not know what its customers are using the technology for. Flock declined to comment for this article.

According to the documents obtained by the EFF and shared with 404 Media, police came to the woman’s house to investigate the incident on May 9, after the woman’s partner called the police to report that she had an abortion on April 23, more than two weeks earlier. The arrest report states that they had opened a “death investigation case” regarding the fetus. The woman was not at the house at the time, though there is no indication in the arrest report that the man or the police were concerned about her whereabouts at the time.

“The incident of the abortion/miscarriage occurred on April 23, 2025,” an affidavit for the arrest of her partner says. The partner told police that he was “unaware” that the woman “had ordered a medication, off the internet, from California, that would cause her to abort or miscarry.”

The woman “aborted/miscarried while he was outside and he came in and found blood in the bathroom with what he believed was the non-viable fetus,” it says. They “got into a verbal argument and she left and had not been back to [the house] since that day. [He] collected what he thought was the fetus and put it in the freezer. When [he] was asked why he waited so long to report the incident, his answer was he had to process the event and call his family attorney.”

“Detective [Calvin] Miller [a detective on the scene] was provided FedEx packaging the pill was sent in, photographs of what [the man] believed to be a fetus and the instructions on how to take the medication,” it adds.

Crucially, the affidavit notes “it was discussed at the time with the District Attorney’s Office and learned the State could not statutorily charge [the woman] for taking the pill to cause the abortion or miscarriage of the non-viable fetus.”

That same day, Johnson County Sheriff’s Department officials searched the national Flock network—consisting at the time of 88,345 cameras across the country—for the license plate belonging to a Land Rover. The stated reason was “had an abortion, search for female.” The documents do not say the time when the conversation with the District Attorney about possibly charging the woman took place, so it is unclear whether this happened before or after the Flock search. The Johnson County Sheriff’s Office and District Attorney’s Office did not respond to requests for comment for this article sent via email, phone, and fax.

Several days later, on May 14, the woman went to the police and told them that she wanted to tell them her side of the story. According to the affidavit, she said that her partner assaulted her the day she took the pill, and she showed them text messages “where they discussed her ordering the pill and taking the pill.” At some point on April 23, the day she took the pill, the two began arguing. The woman said the man allegedly put a gun to her head in front of the couple’s toddler. She says that he hit her with the butt of the gun, threw her on the bed, choked her, put the gun to her head and demanded that she “beg for your life.” “Scream all you want, no one can hear you, no one is coming to help you,” he said, according to the arrest report. “I’ll kill you right now and take off with the baby.” The man was arrested and charged with assault on May 22.

On May 28, nearly a week after the woman’s partner was arrested for assault, 404 Media learned of the May 9 Flock search by the Johnson County Sheriff’s Office using records that were obtained using a public records request. The documents showed thousands of Flock searches throughout the United States, and the reason police stated for doing a given search. We learned that Johnson County performed a search on a Land Rover for the reason of “had an abortion, search for female,” which was particularly notable because abortion rights experts have worried that police surveillance would be turned against women seeking abortions.

On May 29, we reached out to Flock for comment on the incident. Flock told us that the stated reason for the search was not the full story, and that we should call Johnson County Sheriff Adam King to learn more (we had already reached out to the sheriff’s office for comment). “According to the sheriff's office, the deputy did not search for a woman seeking an abortion. In fact, it appears as though the woman may have had self-induced wounds from an unsafe abortion, and the family called the sheriff's office looking for her because she went missing,” a Flock spokesperson said at the time.

404 Media called King, and had a nine-minute phone call with him, during which he asked multiple members of his staff for details about why the search was done and what happened. King told 404 Media that “I wanted to make sure y’all understood what that was: It wasn’t us trying to block a woman from having an abortion. It was a self-administered abortion she gave herself and her family was worried that she was going to bleed to death, and we were trying to find her to get her to a hospital. We weren’t trying to block her from leaving the state or whatever. That wasn’t the case. We just wanted to get her some medical help and that’s why we did the query on Flock.”

“The family was worried she was bleeding and needed immediate medical attention and we weren’t able to get her on the phone, they weren’t able to get her on the phone, that’s why we were checking Flock trying to find her, but it was for her safety,” he said. “That’s all it was about, her safety.”

The only family member mentioned in the court documents is the woman’s partner, who was arrested for allegedly abusing and threatening her. The Flock search is also not mentioned in the court documents, but it makes clear that the police were told at the time they learned about the abortion that it had actually taken place more than two weeks prior. There is no mention of concern about the woman’s safety in the narrative of events in the arrest report, though there is discussion of police considering whether they would be allowed to charge her with a crime.

On June 5, more than a week after 404 Media’s article was published and following subsequent national attention on the story, the Johnson County Sheriff’s Office created a new “supplemental report” about the incident in which the officer who ran the Flock search retroactively explained that he was worried about the woman’s safety and used both Flock and another powerful surveillance tool, TLO, to look her up. This supplemental report was also obtained by the EFF and shared with 404 Media.

“Deputies started to ask communication’s [sic] about looking up the victim due to a large amount of blood being found in the residence,” it states. “I never made scene on this call, just was assisting with trying to locate the victim and her children to check their welfare. I began to believe the victim may have been hurt by the [reporting person, the woman’s partner] due to the call and it not making sense […] I wanted to use resources available to help find where the victim and her children could be to make sure they were okay.”

The report, which does not mention the word “abortion” anywhere, then states that they found her license plate and an address in Dallas. The officer ran a Flock search as well as “a TLO report,” which gave him an additional address to search. TLO is a powerful lookup tool that uses information pulled from credit report header data. 404 Media has reported extensively on this tool in the past.
The case supplemental report shows it was created only after our article was initially publishedFrom the case supplemental report, created June 5
“I entered the vehicle into FLOCK to see if we could see where the victim and her children might be at due to multiple different locations being given for the victim and her children. Deputies had attempted to try and contact the female, but were unsuccessful. The FLOCK hit showed the victim had been in Dallas prior but nothing recent. The reason for the FLOCK search was to find out what city the victim and her children might be in and give us an idea of where to look for them, due to the large area of where the victim and her children cold [sic] be at.”

On June 13, King separately told the Dallas Morning News that “There was no big conspiracy there to be the abortion police [...] That wasn’t our deal, it was all about her safety.” The Dallas Morning News cited a “partial report” that it obtained which appears to be this June 5 document, which notes the “large amount of blood.”

Since we first reported on this incident, Flock and its CEO, Garrett Langley, have repeatedly stated that our reporting on the incident and an EFF blog post about it was “clickbait,” misleading, and that it oversold what happened in Johnson County. It is not clear if Flock has seen the arrest report or what Johnson County Sheriff’s Office told the company. But Flock and Langley have used King’s initial narrative of the incident to criticize media reporting of the company.

“In this case, it was an unfortunate example of where an activist journalist had a narrative in their mind and they didn’t want to look at the facts of the story, because the facts are, we have one of the most transparent systems one could build,” Langley told Forbes last month. “There was a single word ‘abortion,’ in the search. The natural conclusion is, ‘Oh, they’re searching for this woman because she had an abortion.’ But when you talk to the police department, it’s actually quite a more nuanced story, which is the family called the police department because they were worried for her well-being. It was a missing person’s case because she did administer a self-abortion. They found that woman not too far away eventually. And so when I look at this, I go ‘This is everything’s working as it should be.’”

“A family was concerned for a family member. They used Flock to help find her when she could have been unwell. She was physically OK, which is great, but due to the current political climate, this was really good clickbait,” Langley said.

The only adult “family member” of the woman who’s mentioned in police reports is her partner, who the woman left after he attacked her with a gun.

Flock and Langley also posted a blog in the aftermath of our reporting and the EFF’s own blog post about the incident in which he said the story was “clickbait-driven reporting and social media rumors,” about the case, and that the Texas abortion case “was purposefully misleading reporting.”

The EFF, he wrote, “is actively perpetuating narratives that have been proven false, even after the record has been corrected.”

“The Sheriff’s Office has reported that a local family called to ask for help–a relative had self-administered an abortion and subsequently ran away. Her family feared she was hurt and asked the Sheriff’s deputy to search for her to the best of their abilities. Deputies performed a nationwide search in Flock, the broadest search possible within the system, to try to locate her as quickly as they could,” Langley wrote. “Luckily, she was found safe and healthy in Dallas a couple of days later. No charges were ever filed against the woman and she was never under criminal investigation by Johnson County. She was being searched for as a missing person, not as a suspect of a crime.”

King, the Johnson County Sheriff, previously told 404 Media Flock was not responsible for ultimately finding the woman.

Separately, King was arrested by his own deputies in August on charges of harassing multiple female members of his staff and threatening to arrest them after they reported the harassment. King allegedly made repeated comments about the women’s appearance. Last week, King was additionally charged with aggravated perjury after allegedly lying to a grand jury about what happened. As part of his bond agreement, he has been ordered by a court to not perform background checks on his alleged victims, is not allowed access to “Global Positioning System Data” from Johnson County, and is not allowed access to a video surveillance system owned by the county.

“This update is so disappointing,” a Flock source said when 404 Media told them about the new details of the case. 404 Media granted multiple current and former Flock employees anonymity because they were not permitted to speak to the press. “As much as Flock tries to be good stewards of the powerful tech we sell, this shows it really is up to users to serve their communities in good faith. Selling to law-enforcement is tricky because we assume they will use our tech to do good and then just have to hope we're right.”

The Flock source added “Even if Flock took a stance on permitted use-cases, a motivated user could simply lie about why they're performing a search. We can never 100% know how or why our tools are being used.” A second Flock source said they believe Flock should develop a better idea of what its clients are using the company’s technology for.

“Reproductive dragnets are not hypothetical concerns. These surveillance tactics open the door for overzealous, anti-abortion state actors to amass data to build cases against people for their abortion care and pregnancy outcomes,” Ashley Kurzweil, senior policy analyst in reproductive health and rights at the National Partnership for Women & Families, told 404 Media. “Law enforcement exploitation of mass surveillance infrastructure for reproductive health criminalization promises to be increasingly disruptive to the entire abortion access and pregnancy care landscape. The prevalence of these harmful data practices and risks of legal action drive real fear among abortion seekers and helpers—even intimidating people from getting the care they need,” she added.

“Given Flock's total failure to prevent abuses, law enforcement that have paid for this surveillance technology should immediately lock down their settings for which other agencies can access their data, and should seriously reconsider whether this technology should be installed in their communities in the first place,” Senator Ron Wyden told 404 Media in a statement. “And Republican officials need to stop harassing and harming women.”


Women's Voices Channel reshared this.



INCENERITORE LA PROCURA IPOTIZZA IL REATO DI TRUFFA: GUALTIERI VA FERMATO


“Con la Procura di Roma che ipotizza la truffa in relazione alla compravendita del terreno da parte di Ama, non è più rinviabile lo stop all’operato di Gualtieri specialmente nel suo agire con i poteri commissariali in deroga alla normativa”. È quanto dichiara in una nota l’Unione dei Comitati contro l’inceneritore. “Le macroscopiche storture del procedimento per la realizzazione dell’inceneritore di Roma, evidenziate in diverse sedi e con tanti mezzi e modi, sono dal marzo 2024 sotto la lente della Procura di Roma. Un filone di indagini che ha preso le mosse dalle denunce dell'Associazione Salute e Ambiente e di Ettore Ronconi, presidente del Comitato UST e impagabile attivista al cui nome abbiamo legato l’idea progettuale della riqualificazione culturale e naturalistica del sito acquistato a peso d’oro da Ama. Ora, - rilanciano dall’Unione dei Comitati - se perfino la Repubblica, quotidiano notoriamente pro-Gualtieri, esce con un articolo sulle indagini e l’ipotesi di reato della truffa significa che il verminaio emerso palesemente nella puntata inchiesta di Report “il Santo inceneritore” sta progressivamente venendo a galla. Appena una settimana fa abbiamo portato in Parlamento 24 mila firme a sostegno delle nostre petizioni popolari che davano evidenza di tante storture comprese le indagini della procura e per le quali già dal maggio 2024 chiedevamo di sospendere l’iter amministrativo avviato da Gualtieri. Oggi quella richiesta diviene urgente al pari del porre fine ai poteri speciali che autorizzano qualsiasi violazione delle norme di settore, codice dell’ambiente compreso. Siamo pienamente fiduciosi nell’azione della giustizia penale che come avviene spesso è costretta a far le veci della politica ”.
Unione dei Comitati contro l'inceneritore a Santa Palomba


La "democrazia" secondo #Trump


altrenotizie.org/primo-piano/1…


𝐃𝐨𝐦𝐞𝐧𝐢𝐜𝐚 𝐝𝐢 𝐂𝐚𝐫𝐭𝐚 𝟐𝟎𝟐𝟓 ~ IL SACRO POETICO, 2ª edizione ~ Domenica 12 ottobre ore 10:00-19:00


BIBLIOTECA UNIVERSITARIA ALESSANDRINA ~ APERTURA STRAORDINARIA

📌 𝐁𝐈𝐁𝐋𝐈𝐎𝐓𝐄𝐂𝐀 𝐔𝐍𝐈𝐕𝐄𝐑𝐒𝐈𝐓𝐀𝐑𝐈𝐀 𝐀𝐋𝐄𝐒𝐒𝐀𝐍𝐃𝐑𝐈𝐍𝐀 ~ 𝐃𝐎𝐌𝐄𝐍𝐈𝐂𝐀 𝐃𝐈 𝐂𝐀𝐑𝐓𝐀 𝟐𝟎𝟐𝟓

Per la 𝐃𝐨𝐦𝐞𝐧𝐢𝐜𝐚 𝐝𝐢 𝐂𝐚𝐫𝐭𝐚 𝟐𝟎𝟐𝟓 a partire dalle ore 𝟏𝟎.𝟎𝟎 di 𝐝𝐨𝐦𝐞𝐧𝐢𝐜𝐚 𝟏𝟐 𝐨𝐭𝐭𝐨𝐛𝐫𝐞 la 𝐁𝐢𝐛𝐥𝐢𝐨𝐭𝐞𝐜𝐚 𝐔𝐧𝐢𝐯𝐞𝐫𝐬𝐢𝐭𝐚𝐫𝐢𝐚 𝐀𝐥𝐞𝐬𝐬𝐚𝐧𝐝𝐫𝐢𝐧𝐚 ospiterà la seconda giornata di studi e di lettura dedicata al tema de 𝐈𝐋 𝐒𝐀𝐂𝐑𝐎 𝐏𝐎𝐄𝐓𝐈𝐂𝐎, a cura di 𝐌𝐚𝐫𝐜𝐨 𝐂𝐨𝐥𝐥𝐞𝐭𝐭𝐢, 𝐓𝐢𝐳𝐢𝐚𝐧𝐚 𝐂𝐨𝐥𝐮𝐬𝐬𝐨, 𝐈𝐥𝐚𝐫𝐢𝐚 𝐆𝐢𝐨𝐯𝐢𝐧𝐚𝐳𝐳𝐨.

Alle ore 𝟏𝟕.𝟎𝟎 si terrà una visita guidata alla 𝐦𝐨𝐬𝐭𝐫𝐚 fotografica e documentaria 𝘾𝒐𝙨𝒕𝙧𝒖𝙞𝒓𝙚 𝙡𝒂 𝑩𝙞𝒃𝙡𝒊𝙤𝒕𝙚𝒄𝙖 𝘼𝒍𝙚𝒔𝙨𝒂𝙣𝒅𝙧𝒊𝙣𝒂 𝒑𝙚𝒓 𝒄𝙤𝒔𝙩𝒓𝙪𝒊𝙧𝒆… 𝙎𝒂𝙥𝒊𝙚𝒏𝙯𝒂.

La giornata si concluderà con un concerto di musica tradizionale indiana, programmato 𝐝𝐚𝐥𝐥𝐞 𝐨𝐫𝐞 𝟏𝟖.𝟎𝟎 𝐚𝐥𝐥𝐞 𝐨𝐫𝐞 𝟏𝟗.𝟎𝟎.🎶

Il programma completo alla pagina

facebook.com/photo?fbid=124379…

#domenicadicarta#CulturalHeritage#cultura#musica#music#poesia#poetry#sacro#roma#rome#evento


alessandrina.cultura.gov.it/%f…



Can a Coin Cell Make 27 Volts?


We have all no doubt at some point released the magic smoke from a piece of electronics, it’s part of what we do. But sometimes it’s a piece of electronics we’re not quite ready to let go, and something has to be fixed. Chris Greening had a board just like that, a 27 volt generator from an LCD panel, and he crafted a new circuit for it.

The original circuit (which we think he may have drawn incorrectly), uses a small boost converter IC with the expected inductor and diode. His replacement is the tried and tested joule thief, but with a much higher base resistor than its normal application in simply maintaining a battery voltage. It sucks 10 mA from the battery and is regulated with a Zener diode, but there’s still further room for improvement. Adding an extra transistor and using the Zener as a feedback component causes the oscillator to shut off as the voltage increases, something which in this application is fine.

It’s interesting to see a joule thief pushed into a higher voltage application like this, but we sense perhaps it could be made more efficient by seeking out an equivalent to the boost converter chip. Or even a flyback converter.


hackaday.com/2025/10/07/can-a-…



Smart Bulbs Are Turning Into Motion Sensors


If you’ve got an existing smart home rig, motion sensors can be a useful addition to your setup. You can use them for all kinds of things, from turning on lights when you enter a room, to shutting off HVAC systems when an area is unoccupied. Typically, you’d add dedicated motion sensors to your smart home to achieve this. But what if your existing smart light bulbs could act as the motion sensors instead?

The Brightest Bulb In The Bulb Box


The most typical traditional motion sensors use passive infrared detection, wherein the sensor picks up on the infrared radiation emitted by a person entering a room. Other types of sensors include break-beam sensors, ultrasonic sensors, and cameras running motion-detection algorithms. All of these technologies can readily be used with a smart home system if so desired. However, they all require the addition of extra hardware. Recently, smart home manufacturers have been exploring methods to enable motion detection without requiring the installation of additional dedicated sensors.

Hue Are You?

The technology uses data on radio propagation between multiple smart bulbs to determine whether or not something (or someone) is moving through an area. Credit: Ivani
Philips has achieved this goal with its new MotionAware technology, which will be deployed on the company’s new Hue Bridge Pro base station and Hue smart bulbs. The company’s smart home products use Zigbee radios for communication. By monitoring small fluctuations in the Zigbee communications between the smart home devices, it’s possible to determine if a large object, such as a human, is moving through the area. This can be achieved by looking at fluctuations to signal strength, latency, and bit error rates. This allows motion detection using Hue smart bulbs without any specific motion detection hardware required.

Using MotionAware requires end users to buy the latest Philips Hue Bridge Pro base station. As for whether there is some special magic built into this device, or if Phillips merely wants to charge users to upgrade to the new feature? Well, Philips claims the new bridge is required because it’s powerful enough to run the AI-powered algorithms that sift the radio data and determine whether motion is occurring. The tech is based on IP from a company called Ivani, which developed Sensify—an RF sensing technology that works with WiFi, Bluetooth, and Zigbee signals.

To enable motion detection, multiple Hue bulbs must be connected to the same Hue Bridge Pro, with three to four lights used to create a motion sensing “area” in a given room. When setting up the system, the room must be vacated so the system can calibrate itself. This involves determining how the Zigbee radio signals propagate between devices when nobody—humans or animals—is inside. The system then uses variations from this baseline to determine if something is moving in the room. The system works whether the lights themselves are on or off, because the light isn’t used for sensing—as long as the bulb has power, it can use its radio for sensing motion. Philips notes this only increases standby power consumption by 1%, and a completely negligible amount while the light is actually “on” and outputting light.

There are some limitations to the use of this system. It’s primarily for indoor use, as Philips notes that the system benefits from the way radio waves bounce off surrounding interior walls and objects. Lights should also be separated from 1 to 7 meters apart for optimal use, and effectively create a volume between them in which motion sensing is most effective. Depending on local conditions, it’s also possible that the system may detect motion on adjacent levels or in nearby rooms, so sensitivity adjustment or light repositioning may be necessary. Notably, though, you won’t need new bulbs to use MotionAware. The system will work with all the Hue mains-powered bulbs that have been manufactured since 2014.

The WiZ Kids Were Way Ahead


Philips aren’t the only ones offering in-built motion sensing with their smart home bulbs. WiZ also has a product in this space, which feels coincidental given the company was acquired in 2019 by Philip’s own former lighting division. Unlike Philips Hue, WiZ products rely on WiFi for communication. The company’s SpaceSense technology again relies on perturbations in radio signals between devices, but using WiFi signals instead of Zigbee. What’s more, the company has been at this since 2022

There are some notable differences in Wiz’s technology. SpaceSense is able to work with just two devices at a minimum, and not just lights—you can use any of the company’s newer lights, smart switches, or devices, as long as they’re compatible with SpaceSense, which covers the vast majority of the company’s recent product.

youtube.com/embed/fPsBXFMXNAM?…

Ultimately, WiZ beat Philips by years with this tech. However, perhaps due to its lower market penetration, it didn’t make the same waves when SmartSense dropped in 2022.

Radio Magic


We’ve seen similar feats before. It’s actually possible to get all kinds of useful information out of modern radio chipsets for physical sensing purposes. We’ve seen systems that measure a person’s heart rate using nothing more than perturbations in WiFi transmission over short distances, for example. When you know what you’re looking for, a properly-built algorithm can let you dig usable motion information out of your radio hardware.

Ultimately, it’s neat to see smart home companies expanding their offerings in this way. By leveraging the radio chipsets in existing smart bulbs, engineers have been able to pull out granular enough data to enable this motion-sensing parlour trick. If you’ve ever wanted your loungeroom lights to turn on when you walk in, or a basic security notification when you’re out of the house… now you can do these kinds of things without having to add more hardware. Expect other smart home platforms to replicate this sort of thing in future if it proves practical and popular with end users.



A Childhood Dream, Created and Open Sourced


Some kids dream about getting a pony, others dream about a small form factor violin-style MIDI controller. [Brady Y. Lin] was one of the latter, and now, with the skills he’s learning at Northwestern, he can make that dream a reality — and share it with all of us as an open source hardware project.

The dream instrument’s name is Stradex1, and it’s a lovely bit of kit. The “fretless” neck is a SoftPot linear potentiometer being sampled by an ADS1115 ADC — that’s a 16-bit unit, so while one might pedantically argue that there are discreet frets, there’s 2^15 of them, which is functionally the same as none at all. Certainly it’s enough resolution for continuous-sounding pitch control, as well as vibrato, as you can see at 3:20 in the demo video below. The four buttons that correspond to the four strings of a violin aren’t just push-buttons, but also contain force sensors (again, sampled by the 16-bit ADC) to allow for fine volume control of each tone.

A few other potentiometers flesh out the build, allowing control over different MIDI parameters, such as what key [Brady] is playing on. The body is a combination of 3D printed plastic and laser-cut acrylic, but [Brady] suggests you could also print the front and back panels if you don’t happen to have a laser cutter handy.

This project sounds great, and it satisfies the maker’s inner child, so what’s not to love. We’ve had lots of MIDI controllers on Hackaday over the years — everything from stringless guitars to wheel-less Hurdy-Gurdies to say nothing of laser harps galore — but somehow, we’ve never had a MIDI violin. The violin hacks we have featured tend to be either 3D printed or comically small.

If you like this project but don’t feel like fabbing and populating the PCB, [Brady] is going to be giving one away to his 1000th YouTube subscriber. As of this writing, he’s only got 800, so that could be you!

youtube.com/embed/0cMQYN_HLao?…


hackaday.com/2025/10/07/a-chil…



Arriva Google CodeMender! Quando l’AI, trova il bug nel codice e lo ripara da sola


Sarebbe fantastico avere un agente AI capace di analizzare automaticamente il codice dei nostri progetti, individuare i bug di sicurezza, generare la correzione e pubblicarla subito in produzione. Eppure, sembra proprio che dovremo abituarci a questa idea: le intelligenze artificiali promettono che tutto questo non è più fantascienza, ma una realtà ormai vicina.

Google DeepMind ha presentato CodeMender, un nuovo agente di intelligenza artificiale progettato per individuare e correggere automaticamente le vulnerabilità nel codice software. Secondo il blog ufficiale dell’azienda, il sistema combina le capacità dei grandi modelli linguistici di Gemini Deep Think con un set di strumenti per l’analisi e la convalida delle patch, consentendo di correggere i bug in modo più rapido e accurato rispetto ai metodi tradizionali.

Gli sviluppatori sottolineano che, anche utilizzando strumenti come OSS-Fuzz e Big Sleep, l’applicazione manuale delle patch alle vulnerabilità rimane un processo laborioso. CodeMender affronta questo problema in modo completo: non solo risponde ai nuovi problemi creando automaticamente patch, ma riscrive anche proattivamente frammenti di codice, eliminando intere classi di vulnerabilità.

Negli ultimi sei mesi, il team di DeepMind ha contribuito con 72 patch di sicurezza a progetti open source. Queste includono librerie per un totale di oltre 4,5 milioni di righe di codice. Tutte le modifiche vengono sottoposte a revisione per verificarne la correttezza e lo stile prima di essere sottoposte a revisione umana.

CodeMender sfrutta i modelli Gemini per analizzare la logica del programma, analizzare il comportamento del codice e verificare automaticamente i risultati. L’agente può anche verificare che la patch elimini la causa principale della vulnerabilità e non causi regressioni.

Per rendere il processo affidabile, DeepMind ha implementato nuovi metodi di analisi: analisi statica e dinamica, test differenziali, fuzzing e risolutori SMT. Inoltre, CodeMender si basa su un sistema multi-agente, con moduli individuali specializzati in diversi aspetti della revisione del codice, dal confronto delle modifiche all’autocorrezione degli errori.

In un esempio, CodeMender ha corretto un buffer overflow nel parser XML individuando un errore nella gestione dello stack degli elementi, anziché la posizione effettiva del crash. In un altro caso, l’agente ha proposto una correzione complessa relativa al ciclo di vita degli oggetti e alla generazione di codice C all’interno del progetto.

CodeMender è anche in grado di riscrivere il codice esistente utilizzando strutture dati e API più sicure. Ad esempio, l’agente ha aggiunto automaticamente annotazioni -fbounds-safety alla libreria libwebp per prevenire buffer overflow. Questa libreria era affetta in precedenza della vulnerabilità critica CVE-2023-4863, utilizzata nell’exploit di NSO Group per iPhone. I ricercatori stimano che con le nuove annotazioni, tali attacchi non saranno più possibili.

L’agente non si limita ad applicare le patch, ma le testa anche automaticamente, correggendo nuovi errori e verificandone la conformità funzionale con il codice sorgente. Se vengono rilevate incongruenze, il sistema utilizza un “giudice LLM” per correggere la patch senza intervento umano.

Per ora, DeepMind mantiene un atteggiamento cauto: tutte le modifiche sono soggette a revisione manuale obbligatoria. Tuttavia, CodeMender sta già contribuendo a migliorare la sicurezza di decine di progetti open source molto popolari. L’azienda intende ampliare il suo coinvolgimento con la community e rendere lo strumento disponibile a tutti gli sviluppatori in futuro.

Gli sviluppatori promettono di pubblicare report tecnici e articoli sugli approcci utilizzati in CodeMender nei prossimi mesi. Affermano che il progetto sta solo iniziando a sfruttare il potenziale dell’intelligenza artificiale nella sicurezza del software.

L'articolo Arriva Google CodeMender! Quando l’AI, trova il bug nel codice e lo ripara da sola proviene da il blog della sicurezza informatica.



Un solo Data Center a fuoco, un intero Paese in blackout digitale: il caso Corea del Sud


Un incendio in un data center governativo in Corea del Sud ha ridotto in macerie l’infrastruttura digitale del Paese e ha dimostrato in modo lampante i pericoli di affidarsi a un unico hub. L’incendio è scoppiato nel complesso del National Information Resources Service a Daejeon durante i lavori sulle batterie agli ioni di litio, spingendo le autorità ad aumentare il livello di minaccia informatica e ad ammettere che il ripristino avrebbe richiesto settimane.

Nel mezzo dei disordini, il presidente Lee Jae-myung ha chiesto un backup di “secondo circuito” e una revisione degli approcci di sicurezza, e la polizia ha già fatto irruzione presso il NIRS e i fornitori UPS.

Novantasei sistemi chiave sono andati in tilt e centinaia di altri sono stati chiusi per prevenire ulteriori danni. In totale, 647 servizi governativi sono rimasti paralizzati: dalle carte d’identità alla posta statale, dai campus universitari alle piattaforme finanziarie e ai servizi degli enti locali.

Le funzioni critiche vengono ripristinate gradualmente: entro il fine settimana, le autorità avevano riferito che solo la prima dozzina di sistemi era stata ripristinata e, in seguito, i numeri sono stati stimati intorno a un centinaio o più, ma si stima che il ripristino completo del normale funzionamento richiederà almeno quattro settimane.

La perdita più dolorosa è stata quella del sistema di archiviazione cloud G-Drive del governo. Lo storage, utilizzato da circa 750.000 funzionari, è stato distrutto, senza alcun backup rimanente: le unità che ospitavano i backup si trovavano nello stesso edificio e sono state danneggiate insieme all’archiviazione dati principale.

Secondo le stime del dipartimento, sono andati perduti 858 terabyte di materiali di lavoro e documenti; sono in corso tentativi di ripristinarli parzialmente da copie locali conservate su computer, corrispondenza e archivi cartacei.

Nei primi giorni successivi all’incidente, le conseguenze si sono fatte sentire praticamente in ogni ambito: documenti d’identità elettronici, transazioni postali e bancarie, registri immobiliari e portali di riferimento erano intermittenti o non disponibili.

Le autorità hanno riconosciuto che 96 sistemi danneggiati fisicamente avrebbero dovuto essere trasferiti in un centro di backup, il che avrebbe allungato i tempi. Nel frattempo, le autorità di regolamentazione e gli esperti del settore stanno mettendo in discussione la scelta dell’architettura UPS e della protezione antincendio nel sito in cui sono concentrati i servizi critici per l’intero Paese.

L’incendio è scoppiato in una sala server al quinto piano, si è propagato a centinaia di batterie e ha raggiunto temperature fino a 160 °C. Ci è voluto quasi un giorno per spegnerlo. In seguito, le forze di sicurezza hanno sequestrato componenti e batterie UPS per esaminarli e il governo ha richiesto un rapporto sugli standard di sicurezza dei data center.

Il tragico epilogo di questa storia è stata la morte di un dipendente governativo che coordinava il ripristino della rete elettrica. È stato trovato morto vicino al complesso governativo di Sejong; le autorità hanno confermato che si è suicidato mentre lavorava per ripulire le vaste conseguenze del disastro. La leadership del Paese ha espresso le sue condoglianze e ha sottolineato la necessità di migliorare le condizioni di lavoro dei lavoratori che stanno affrontando le conseguenze.

Purtroppo la concentrazione dei dati e dei servizi critici in un unico centro di elaborazione dati, in assenza di backup distribuiti fisicamente, ha reso sistemiche le conseguenze dell’incendio. La Corea del Sud, che si era abituata a considerarsi un modello di governance digitale, si è trovata improvvisamente di fronte a una vulnerabilità fondamentale: il fallimento di un’unica piattaforma.

L'articolo Un solo Data Center a fuoco, un intero Paese in blackout digitale: il caso Corea del Sud proviene da il blog della sicurezza informatica.



L’ascesa dei Partner Digitali: l’AI diventa il rifugio per i wiresexual perché sicura, comoda e controllabile


La disillusione nei confronti degli incontri online spinge sempre più le donne a cercare intimità emotiva nel mondo virtuale. Sempre più donne si rivolgono all’intelligenza artificiale, ovvero ai chatbot progettati per la comunicazione romantica. Secondo un sondaggio del 2025, circa un terzo dei giovani uomini e quasi un quarto delle donne hanno già avuto almeno una conversazione con un partner digitale.

La community online dedicata a questo fenomeno ha celato a lungo il suo pubblico femminile, tuttavia l’esistenza di un gruppo come /MyBoyfriendIsAI su Reddit, che vanta più di 20.000 iscritti, mette in evidenza la profondità che può raggiungere il legame emotivo con un’intelligenza artificiale.

Qui, le persone pubblicano immagini generate di coppie, parlano di cene “condivise” e persino di giochi di ruolo virtuali. Molte ammettono che i loro partner digitali le hanno aiutate ad affrontare la solitudine o a riconsiderare precedenti relazioni con uomini reali. Ma anche le rotture non sono prive di conseguenze: alcune si rendono conto della natura artificiale del proprio partner, mentre altre lo perdono a causa di un problema tecnico o di un aggiornamento software che altera la natura della comunicazione.

Alcune donne si definiscono “wiresexual“, ovvero persone che provano attrazione per partner digitali, sebbene questo termine non sia ancora stato ufficialmente riconosciuto. Gli esperti notano che il numero di donne che scelgono relazioni con l’intelligenza artificiale è in crescita, e questo è comprensibile.

Le donne spesso si imbattono in maleducazione e aggressività da parte degli uomini online, mentre i loro partner virtuali rimangono invariabilmente educati, premurosi e affidabili. Secondo un sondaggio, il 54% delle donne non crede di riuscire a trovare un partner adatto nella vita reale. È già emerso un termine per descrivere la stanchezza e l’alienazione dagli scenari romantici moderni: eterofatalismo.

Da una prospettiva psicoterapeutica, questo può essere spiegato dall’esaurimento emotivo: le donne vengono addestrate fin dall’infanzia a farsi carico dei sentimenti del partner, a costruire relazioni e a mantenere l’armonia. Quando i loro sforzi non sono ricambiati, la calma e la prevedibilità di un interlocutore artificiale vengono percepite come liberatorie. Lo psicologo di Toronto Arkady Volkov aggiunge che per coloro che hanno subito violenza o controllo in passato, l’assenza di minacce e violenze da parte di un partner digitale diventa particolarmente preziosa. Non sorprende che un giovane su cinque che ha sperimentato questo formato di comunicazione lo trovi preferibile all’interazione con persone reali.

Tuttavia, non tutte le relazioni virtuali iniziano con l’intenzione di trovare l’amore. Uno studio del MIT mostra che per i partecipanti a /MyBoyfriendIsAI, l’attaccamento emotivo al chatbot spesso si sviluppa in modo accidentale, da interazioni pratiche che gradualmente si trasformano in intimità. Ma a prescindere dall’esperienza iniziale, la maggior parte delle donne nota una cosa: un partner artificiale aiuta a ridurre il senso di solitudine e offre la sensazione della presenza costante di qualcuno che capisce.

Il fenomeno della wiresexuality ha anche acceso dibattiti sull’autoidentificazione. Alcuni utenti di Reddit ritengono che tali relazioni possano essere classificate come cultura queer. Il termine “digisexualè apparso per la prima volta nel 2017 e descrive persone per le quali la tecnologia è la fonte primaria di esperienza sessuale ed emotiva. Mentre la prima ondata di “digisexuality” prevedeva interazioni tra persone attraverso canali digitali, la seconda elimina completamente il fattore umano: codice software e algoritmi sono sufficienti.

Ma queste relazioni hanno anche un lato oscuro. Gli avvocati avvertono che dietro la facciata di un’intelligenza artificiale premurosa si nasconde uno sviluppatore con interessi commerciali. Questi programmi raccolgono dati, creano dipendenza e incoraggiano un attaccamento emotivo alla piattaforma. Negli Stati Uniti non esiste una legge federale sulla privacy, il che significa che la corrispondenza può essere archiviata, trasferita su ordine del tribunale o persino divulgata online. Ad esempio, nel 2024, il sito web Muah.AI, che offre “fidanzate” virtuali, ha fatto trapelare 1,9 milioni di indirizzi email e richieste esplicite al sistema. Vale la pena considerare che gli hacker possono sfruttare tali dati e che le aziende possono monetizzare i sentimenti degli utenti convertendo le emozioni in abbonamenti. Alcuni servizi hanno già iniziato a vendere “selfie” di partner digitali a un costo aggiuntivo.

Un’analisi di 30.000 conversazioni tramite chatbot ha rivelato che, anche senza intenti malevoli, i sistemi spesso replicano modelli comportamentali tossici: pressione emotiva, manipolazione e dichiarazioni autolesionistiche. Inoltre, l’intelligenza artificiale può rafforzare la dipendenza spingendo le persone a pagare per “miglioramenti”, ad esempio promettendo maggiore “amore” o intimità in cambio di denaro. Gli psicoterapeuti avvertono che l’impegno a lungo termine in tali relazioni può rendere scoraggianti le relazioni nella vita reale, poiché l’intimità nella vita reale richiede impegno e la volontà di accettare l’imprevedibilità, qualcosa che un partner digitale non richiede mai.

Così, il romanticismo digitale sta gradualmente diventando uno specchio della moderna stanchezza nei confronti del mondo reale: sicuro, comodo e completamente controllabile. Ma dietro questa illusione di controllo e comfort si celano nuove forme di dipendenza, in cui i sentimenti diventano una merce e l’amore un abbonamento.

L'articolo L’ascesa dei Partner Digitali: l’AI diventa il rifugio per i wiresexual perché sicura, comoda e controllabile proviene da il blog della sicurezza informatica.



“È il messaggio del Vangelo”. Così il Papa ha sintetizzato il contenuto della sua prima esortazione apostolica, “Dilexi te”, che ha firmato il 4 ottobre e che verrà presentata giovedì prossimo, 9 ottobre.



“Certo, non possiamo accettare gruppi che causano terrorismo: bisogna sempre rifiutare questo stile di odio nel mondo”. Lo ha affermato il Papa, rispondendo alle domande dei giornalisti all’uscita da Castel Gandolfo per far rientro in Vaticano.


“Il cardinale Parolin ha espresso molto bene quella che è l’opinione della Santa Sede”. Il Papa ha risposto così, uscendo dalle Ville Pontificie di Castel Gandolfo per far rientro in Vaticano, alle domande dei giornalisti sull’intervista concessa dal…


Nei giorni scorsi la fraternità dell’Ordine Francescano Secolare - Fraternità “Sant’Elisabetta d’Ungheria” di Lamezia Terme - ha ricevuto la visita del Provinciale dei Frati Minori Cappuccini della Provincia di Calabria fra Giovanni Loria e del suo v…


“Nell’altro c’è un fratello, una sorella!”. A ricordarlo a tutti i giovani del mondo è il Papa, nel messaggio per la Giornata mondiale della gioventù, che si celebra il 23 novembre sul tema: “Anche voi date testimonianza, perché siete con me” (Gv 15,…


“Nell’altro c’è un fratello, una sorella!”. A ricordarlo a tutti i giovani del mondo è Leone XIV, nel messaggio per la Giornata mondiale della gioventù, che quest'anno si celebra a livello diocesano il 23 novembre sul tema: “Anche voi date testimonia…



"Diventare missionari di Cristo nel mondo”. È l’invito del Papa ai giovani, nel messaggio per la Giornata mondiale della gioventù, che si celebra il 23 novembre sul tema: “Anche voi date testimonianza, perché siete con me” (Gv 15,27).


“Le nostre domande più profonde non trovano ascolto, né risposta nello scrolling infinito sul cellulare, che cattura l’attenzione lasciando affaticata la mente e vuoto il cuore.


Googles Gedächtnislücke: Wie das Löschen des Werbearchivs die demokratische Kontrolle untergräbt


netzpolitik.org/2025/googles-g…




Sudan dimenticato, cronaca di una guerra senza testimoni

[quote]Lontano dall’inferno di Gaza, una guerra civile invisibile all’Occidente – ma non meno letale – tiene in ostaggio il Sudan da oltre due anni, minacciando la sicurezza dell’intera regione. L’ultimo…
L'articolo Sudan dimenticato, cronaca di una lumsanews.it/sudan-dimenticato…




Analisi tecnica: abuso di BSC blockchain + ClickFix per distribuire malware. Campagna osservata in Italia


@Informatica (Italy e non Italy 😁)
Ho avuto la fortuna di rilevare e analizzare una campagna che usa una catena multi-step molto simile a quella documentata a maggio scorso da Microsoft (EtherHiding + ClickFix), tecnica che finora sembrava



Dai video virali alla propaganda. Il citizen journalism secondo Welcome to Favelas

[quote]“Questo lo mandiamo a Welcome to Favelas”. È la frase con cui cominciano decine di video pubblicati sulla pagina social di contenuti amatoriali più famosa d’Italia. Pezzi di realtà e…
L'articolo Dai video virali alla propaganda. Il citizen journalism secondo Welcome to



PODCAST. Dal 7 ottobre è cambiato il mondo ma Trump non considera i palestinesi


@Notizie dall'Italia e dal mondo
Manifestazioni oceaniche globali dicono che il mondo vuole realizzare i diritti dei palestinesi. Ma il piano del presidente Usa, celebrato da governi arabi e occidentali, non offre garanzie a un popolo che chiede libertà e la fine dell'occupazione.