Salta al contenuto principale



Modelli di missione



«Non viviamo in un’epoca di cambiamento, viviamo un cambiamento d’epoca»: questa affermazione, più volte ribadita da papa Francesco, nell’ambiente missionario viene ripresa «per rafforzarne un’altra di uso frequente: il “cambiamento di paradigma” della missione di oggi. L’uso di queste due espressioni consacra, da una parte, l’idea di processo radicale di trasformazione e, dall’altra, quella di cambiamento di modello di missione, quasi ci fosse un solo, unico modello» (p. 9). L’A., missionario comboniano portoghese, «si propone di riflettere sui modelli di missione che si sono imposti nella Chiesa del postconcilio e di illuminare questa riflessione con il contributo degli ultimi pontificati, in particolare di quello francescano» (p. 11).

Il saggio si articola in 13 capitoli, di cui i primi tre chiarificano i termini utilizzati nel titolo: in quale senso si parla di «modelli» e cosa si intende per «riconfigurazione». La riflessione non «ha pretese teologiche o ecclesiologiche quanto al contenuto, né accademiche quanto alla forma. Cercherà di costruirsi come saggio esplorativo, dalla finalità divulgativa» (p. 15). In questa prospettiva, i modelli di missione vanno intesi «come concetti di riferimento spirituale, fonte di ispirazione e di motivazione che orientano l’impegno» (p. 16). L’intento è dialogico e propositivo, «offrendo soprattutto le ragioni per capire i diversi modelli e, eventualmente, preferire l’uno o l’altro» (p. 18), con una particolare attenzione all’insegnamento di papa Francesco: «La conversione (termine da lui usato) può essere vista come punto di partenza che porta alla riconfigurazione (termine del nostro sottotitolo) della vita della Chiesa in tutte le sue dimensioni» (p. 20).

Un capitolo è dedicato all’insegnamento di Francesco su temi che attraversano in modo trasversale i diversi modelli. La gioia del Vangelo, la Chiesa in uscita, i quattro princìpi enunciati nell’Evangelii gaudium (cfr nn. 222-237), che «possono essere applicati con profitto a ogni modello della missione e possono fungere da bussola» (p. 27); la santità come il volto più bello della Chiesa, che si può riprendere «anche in relazione ai missionari e ai modelli di missione.

L’A. esamina sei modelli possibili di missione, per ciascuno dei quali viene data una breve presentazione, richiamato il fondamento biblico, delineato un sommario percorso storico, illuminato l’apporto di papa Francesco, valutati i punti forti e i punti deboli.

Si susseguono i modelli di missione come annuncio, come incontro, come servizio, come fraternità, come liberazione, e infine, come ecologia integrale, che «appare come un modello in progress» (p. 156). Gli Istituti missionari sono nati nell’Ottocento e rispondevano alle esigenze di un contesto sociale ed ecclesiale molto diverso da quello attuale. La crisi del paradigma missionario ne interroga l’identità e stimola l’approfondimento del carisma fondazionale: «Il papa sembra suggerire un cambiamento di prospettiva: non siamo noi a possedere definitivamente un carisma, è il carisma che, in modo dinamico e come grazia divina, possiede noi nelle stagioni della nostra vita, nelle varie epoche e generazioni di un istituto o comunità» (p. 185). Da qui anche la riflessione sul rapporto tra il carisma e l’istituzione, che fa fatica a tenere il passo: «Troviamo più ispirazione, carisma e profetismo riguardo alla missione nelle parole e nei gesti di papa Francesco che non nelle strutture deputate all’accompagnamento e al sostegno della missione» (p. 201).

Secondo l’A., la riforma della Curia con la costituzione Praedicate Evangelium, se da una parte sembra proporre la riconfigurazione missionaria della Chiesa, istituendo al primo posto fra i dicasteri quello per l’evangelizzazione, presieduto direttamente dal Pontefice, dall’altra «non mancherà di suscitare qualche viva inquietudine tra i missionari» (p. 203). Questi già con la riforma della Curia di Giovanni Paolo II erano passati dalla giurisdizione canonica della Congregazione «De Propaganda Fide», sotto il cui patrocinio erano nati e ricevevano sostegno, a quella per gli Istituti di vita consacrata e le Società di vita apostolica, che di fatto ha sfaldato l’attenzione alla missione e ai missionari e spostato l’accento della loro identità: «I missionari sono passati così a essere visti come religiosi (anche) missionari, anziché missionari (anche religiosi)» (p. 199).

«Quella degli istituti missionari nati nell’Ottocento è una storia bella, che risveglia la speranza e ci fa sperare in cose nuove» (p. 210), in una Chiesa che non ha una missione, ma è missione. Come scrive il card. José Tolentino de Mendonça nella Prefazione: «La complessità della presente stagione non dovrebbe […] essere letta come un ostacolo, ma come una opportunità» (p. 6).

The post Modelli di missione first appeared on La Civiltà Cattolica.



La bolla dell’intelligenza artificiale sta per scoppiare


@Informatica (Italy e non Italy 😁)
Startup che bruciano soldi e non generano guadagni, investimenti da migliaia di miliardi che non stanno venendo ripagati e manovre finanziarie opache: i conti dell’intelligenza artificiale non tornano.
L'articolo La bolla dell’intelligenza artificiale sta per scoppiare proviene da Guerre di Rete.



E-Mail e Affidabilità del servizio


@Informatica (Italy e non Italy 😁)
Parliamo di posta elettronica ed, in particolare, della posta elettronica ordinaria e della sua affidabilità. Oggi parliamo dell’attendibilità di un servizio che ogni giorno permette di scambiare miliardi di messaggi […]
L'articolo E-Mail e Affidabilità del servizio proviene da Edoardo Limone.

L'articolo proviene dal blog



Sarà arrivato un drone russo da dietro e non l'ha visto.

Crosetto operato d’urgenza al colon, condizioni buone
Il ministro della Difesa, Guido Crosetto, è stato sottoposto lunedì 8 ottobre a un intervento chirurgico presso l’ospedale Fatebenefratelli di Roma per l’asportazione di tre polipi al colon. Secondo il comunicato ufficiale del Ministero, l’operazione è andata a buon fine, senza complicazioni e Crosetto è vigile e stabile. L’equipe medica ha eseguito l’intervento con tecniche tradizionali, in un quadro clinico stabile e il ministro è stato seguito nelle ore successive in regime di degenza ordinaria. Il personale medico è in attesa dell’esame istologico per accertare la natura delle formazioni rimosse. Al momento non è stato comunicato alcun dettaglio ufficiale sui tempi di recupero né sull’eventuale ripresa dell’attività istituzionale del ministro.

L'indipendente



Autunno visionario 2025 – La poetica del nord ovest
freezonemagazine.com/news/autu…
Seconda edizione della rassegna che, lo scorso anno, aveva sancito la nascita del sodalizio artistico tra il Black Inside e Visioni Musicali. Paolo Zangara (direttore artistico del Black Inside) ha assecondato l’idea di Fabio Baietti (ormai più curatore artistico di eventi live che blogger musicale) di allestire un prestigioso cartellone di quattro concerti,


GOLEM - Linux Day 2025


blog.golem.linux.it/2025/10/li…
Segnalato da Linux Italia e pubblicato sulla comunità Lemmy @GNU/Linux Italia
Sabato 25 ottobre 2025 torna il Linux Day: la principale manifestazione comunitaria italiana dedicata al software libero, alla cultura aperta e alla condivisione! L’evento è coordinato a livello nazionale da ILS –



il mondo non ruota attorno alla Segre, ma perché non voler usare la parola genocidio se questa descrive accuratamente quello che sta avvenendo? è come sostenere che israele al momento come stato fa "onco ai bai" (come si dice a livorno) ma negare il reale motivo di base per cui fa schifo. non è questione da poco compiere un genocidio, azione che va avanti da 50 anni... difficile non notarlo in così tanto tempo.




“Riprendiamoci il web”. Non è mica come dirlo…
freezonemagazine.com/articoli/…
Giovedì 2 ottobre, primo antefatto Leggo una notizia ANSA: Tim Berneers-Lee, l’informatico che ebbe l’intuizione del WWW e lo mise a disposizione gratuitamente, lancia l’appello: “Oggi il web non è più libero (…) Possiamo ridare potere agli individui e riprenderci il web. Non è troppo tardi”. Lunedì 6 ottobre, secondo antefatto Scrivo a Gianni Zuretti, […]
L'articolo


GAZA. Assaltata la Freedom Flotilla 2, gli attivisti portati a Ashdod


@Notizie dall'Italia e dal mondo
A bordo della The Coscience c'erano 93 persone tra medici, giornalisti e attivisti. Altre decine di volontari sono sulle barche della Thousand Madleens To Gaza
L'articolo GAZA. Assaltata la Freedom Flotilla 2, gli attivisti portati a Ashdod proviene da Pagine Esteri.




Tips for C Programming from Nic Barker


Diagram of C99 designated initializers.

If you’re going to be a hacker, learning C is a rite of passage. If you don’t have much experience with C, or if your experience is out of date, you very well may benefit from hearing [Nic Barker] explain tips for C programming.

In his introduction he notes that C, invented in the 70s by Dennis Ritchie, is now more than 50 years old. This old language still appears in lists of the most popular languages, although admittedly not at the top!

He notes that the major versions of C, named for the year they were released, are: C89, C99, C11, and C23. His recommendation is C99 because it has some features he doesn’t want to live without, particularly scoped variables and initializing structs with named members using designated initializers. Also C89 is plagued with non-standard integer types, and this is fixed by stdint.h in C99. Other niceties of C99 include compound literals and // for single-line comments.

He recommends the use of clang arguments -std=c99 to enable C99, -Wall to enable all warnings, and -Werror to treat warnings as errors, then he explains the Unity Build where you simply include all of your module files from your main.c file.

It’s stressed that printf debugging is not the way to go in C and that you definitely want to be using a debugger. To elaborate on this point he explains what a segfault is and how they happen.

He goes on to explain memory corruption and how ASAN (short for Address Sanitisation) can help you find when it happens. Then he covers C’s support for arrays and strings, which is, admittedly, not very much! He shows you that it’s pretty easy to make your own array and string types though, potentially supporting slices as well.

Finally he explains how to use arenas for memory allocation and management for static, function, and task related memory.

youtube.com/embed/9UIIMBqq1D4?…


hackaday.com/2025/10/07/tips-f…



Building a Diwheel to Add More Tank Controls to Your Commute


It’s often said that one should not reinvent the wheel, but that doesn’t mean that you cannot change how the use of said wheel should be interpreted. After initially taking the rather zany concept of a monowheel for a literal ride, [Sam Barker] decided to shift gears, did a ‘what if’ and slapped a second monowheel next to the first one to create his diwheel vehicle. Using much thicker steel for the wheels and overall much more robust construction than for his monowheel, the welding could commence.

It should be said here that the concept of a diwheel, or dicycle, isn’t entirely new, but the monowheel – distinct from a unicycle – is much older, with known builds at least as far back as the 19th century. Confusing, self-balancing platforms like Segways are also referred to as ‘dicycles’, while a diwheel seems to refer specifically to what [Sam] built here. That said, diwheels are naturally stable even without gyroscopic action, which is definitely a big advantage.

The inner frame for [Sam]’s diwheel is built out of steel too, making it both very robust and very heavy. High-tech features include suspension for that smooth ride, and SLS 3D-printed nylon rollers between the inner frame and the wheels. After some mucking about with a DIY ‘lathe’ to work around some measurement errors, a lot more welding and some questionable assembly practices, everything came together in the end.

This is just phase one, however, as [Sam] will not be installing pedals like it’s an old-school monowheel. Instead it’ll have electrical drive, which should make it a bit less terrifying than the Ford Ka-based diwheel we featured in 2018, but rather close to the electric diwheel called EDWARD which we featured back in 2011. We hope to see part two of this build soon, in which [Sam] will hopefully take this beast for its first ride.

youtube.com/embed/xKOHrBmhexU?…


hackaday.com/2025/10/07/buildi…



Ilaria Salis è salva, l’Europa no


@Giornalismo e disordine informativo
articolo21.org/2025/10/ilaria-…
Ilaria Salis, per fortuna, non dovrà tornare in Ungheria. Non cadrà fra le grinfie di un governo illiberale, pericoloso e anti-europeista come quello di Orbán e questo è un bene. Il Parlamento europeo, infatti, nel momento decisivo, l’ha salvata per appena un voto, frutto



Neppure Scilla, …somos Flotilla


@Giornalismo e disordine informativo
articolo21.org/2025/10/neppure…
Non ho altro in testa. Mi butterei senza salvagente da una di quelle bellissime barche dai nomi new age. E nuoterei ..fino a non poterne più!..raggiungendo a nuoto la terra dell’umanità, che non si trova in acque internazionali, dove i ciclopi attendono famelici e pronti a sferrare



Il ritorno della Mutua dopo il collasso del SSN


@Giornalismo e disordine informativo
articolo21.org/2025/10/il-rito…
La crisi (pietoso eufemismo) del SSN, è il prodotto di politiche che nel corso degli anni hanno costantemente delegato al privato la responsabilità della salute pubblica. Il business della sanità a pagamento ne è la logica




“Senza Parole. Gaza, l’informazione negata”. Gubbio, 8 ottobre


@Giornalismo e disordine informativo
articolo21.org/2025/10/senza-p…
Gubbio, Biblioteca Sperelliana Martedì 8 ottobre 2025 – ore 18.00–19.30/19.40 18.10 – 18.20 Introduzione del moderatore (D. Morini) Tema: giornalismo e libertà di stampa nel mondo Dati emblematici




Conflitto di interessi, Libera: Parlamento torni a discuterne


@Giornalismo e disordine informativo
articolo21.org/2025/10/conflit…
In una nota Libera esprime una forte preoccupazione per il disegno di legge d’iniziativa parlamentare teso ad introdurre, nella legge istitutiva della Commissione parlamentare d’inchiesta



trump è una garanzia se lo scopo è dimettere tutti i servizi federali.... non ho ancora capito se spegne lo stato federale tramite i servizi il suo status di presidente degli stati uniti a quale istituzione si riferisce.


REPORT UMANITARIO -SITUAZIONE NELLA STRISCIA DI GAZA...

REPORT UMANITARIO -SITUAZIONE NELLA STRISCIA DI GAZA (2023–2025)
absppodv.org/notizie/report-um…



JawnCon Returns This Weekend


For those local to the Philadelphia area, a “jawn” can be nearly anything or anyone — and at least for this weekend, it can even be a hacker con building up steam as it enters its third year. Kicking off this Friday at Arcadia University, JawnCon0x2 promises to be another can’t-miss event for anyone with a curious mind that lives within a reasonable distance of the Liberty Bell.

The slate of talks leans slightly towards the infosec crowd, but there’s really something for everyone on the schedule. Presentations such as Nothing is Safe: An Introduction to Hardware (In)Security and Making the GameTank – A New, Real 8-Bit Game Machine will certainly appeal to those of us who keep a hot soldering iron within arm’s reach, while Rolling Recon & Tire Prints: Perimeter Intrusion Detection and Remote Shenanigans via Rogue Tire Stem RF and Get More Radio Frequency Curious will certainly appeal to the radio enthusiasts.

Speaking of which, anyone who wants to make their interest in radio official can sit in on the Saturday study group led by Ed “N2XDD” Wilson, the Director of the American Radio Relay League (ARRL) Hudson Division. After lunch, you can take your exam to become a licensed ham, and still have time to check out the lockpicking demonstrations from the local TOOOL chapter, the Retro Show ‘n Tell area, and rummage through the self-replenishing table of free stuff that’s looking for a new home.

Attendees can also take part in a number of unique challenges and competitions inspired by the shared professional experience of the JawnCon organizers. One of the events will have attendees putting together the fastest Digital Subscriber Line (DSL) broadband connection, as measured by era-appropriate commercial gear. Easy enough with a spool of copper wire, but the trick here is to push the legendary resilience of DSL to the limit by using unusual conductors. Think wet strings and cooked pasta. There’s also a Capture The Flag (CTF) competition that will pit teams against each other as they work their way through customer support tickets at a fictional Internet service provider.

We were on the ground for JawnCon in 2024, and even had the good fortune to be present for the inaugural event back in 2023. While it may not have the name recognition of larger East Coast hacker cons, JawnCon is backed by some of the sharpest and most passionate folks we’ve come across in this community, and we’re eager to see the event grow in 2025 and beyond.


hackaday.com/2025/10/07/jawnco…



Tovaglia Natalizia


La Tovaglia Natalizia è lavabile, pratica e perfetta per sala da pranzo, picnic, feste o per aggiungere stile alla decorazione.


Qualcomm Introduces the Arduino Uno Q Linux-Capable SBC


Generally people equate the Arduino hardware platforms with MCU-centric options that are great for things like low-powered embedded computing, but less for running desktop operating systems. This looks about to change with the Arduino Uno Q, which keeps the familiar Uno formfactor, but features both a single-core Cortex-M33 STM32U575 MCU and a quad-core Cortex-A53 Qualcomm Dragonwing QRB2210 SoC.

According to the store page the board will ship starting October 24, with the price being $44 USD. This gets you a board with the aforementioned SoC and MCU, as well as 2 GB of LPDDR4 and 16 GB of eMMC. There’s also a WiFi and Bluetooth module present, which can be used with whatever OS you decide to install on the Qualcomm SoC.

This new product comes right on the heels of Arduino being acquired by Qualcomm. Whether the Uno Q is a worthy purchase mostly depends on what you intend to use the board for, with the SoC’s I/O going via a single USB-C connector which is also used for its power supply. This means that a USB-C expansion hub is basically required if you want to have video output, additional USB connectors, etc. If you wish to run a headless OS install this would of course be much less of a concern.


hackaday.com/2025/10/07/qualco…



È stato approvato oggi al Senato il disegno di legge sulle “Disposizioni in favore degli alunni e degli studenti ad alto potenziale cognitivo e delega al Governo per il riconoscimento dei medesimi”, un provvedimento che valorizza le capacità di tutte…


“In the other person there is a brother, a sister!”, writes Pope Leo XIV addressing young people worldwide in his message for the 40th World Youth Day, to be celebrated at the diocesan level on November 23 this year with the theme: “You also are my w…


EU-Überwachungspläne: Unionsfraktion jetzt gegen Chatkontrolle, Innenministerium will sich nicht äußern


netzpolitik.org/2025/eu-ueberw…



2025 Hackaday Supercon: More Wonderful Speakers


Supercon is just around the corner, and we’re absolutely thrilled to announce the second half of our slate! Supercon will sell out so get your tickets now before it’s too late. If you’re on the fence, we hope this pushes you over the line. And if it doesn’t, stay tuned — we’ve still got to tell you everything about the badge and the fantastic keynote speaker lineup.

(What? More than one keynote speaker? Unheard of!)

And as if that weren’t enough, there’s delicious food, great live music, hot soldering irons, and an absolutely fantastic crowd of the Hackaday faithful, and hopefully a bunch of new folks too. If you’re a Supercon fan, we’re looking forward to seeing you again, and if it’s your first time, we’ll be sure to make you feel welcome.

Amie Dansby and Karl Koscher
Hands-On Hardware: Chip Implants, Weird Hacks, and Questionable Decisions

What happens when your body is the dev board? Join Amie Dansby, who’s been living with four biochip implants for years, and Karl Koscher as they dive into the wild world of biohacking, rogue experiments, and deeply questionable decisions in the name of science, curiosity, and chaos.

Arsenio Menendez
Long Waves, Short Talk: A Practical IR Spectrum Guide

Whether you’re a seasoned sensor engineer or a newcomer join us in exploring the capabilities of SWIR, MWIR, and LWIR infrared bands. Learn how each wavelength range enables enhanced vision across a variety of environments, as well as how the IR bands are used in surveillance, industrial inspection, target tracking, and more.

Daniel [DJ] Harrigan
Bringing Animatronics to Life

This talk explores the considerations behind designing a custom Waldo/motion capture device that allows him to remotely puppet a complex animatronic with over twenty degrees of freedom. We’ll discuss the electrical, mechanical, and software challenges involved in creating a responsive, robust remote controller.

Daryll Strauss
Covert Regional Communication with Meshtastic

Learn how Meshtastic uses low-cost LORA radios to build ad hoc mesh networks for secure, decentralized communication. We’ll cover fundamentals, hardware, configuration tips, and techniques to protect against threats, whether for casual chats, data sharing, or highly covert group communication.

Allie Katz and SJ Jones
Fireside Chat: Metal 3D Printing … in space?!

Metal 3D Printing … in space?! SJ Jones is an additive manufacturing solutions engineer and nobody knows metal printing for intense applications like they do. In this discussion they’ll be talking with designer and 3D printing expert Allie Katz about computational design, artful engineering, and 3D prints that can survive a rocket trip.

Davis DeWitt
Movie Magic and the Value of Practical Effects

What does it take to create something that’s never been seen before? In film and TV, special effects must not only work, but also feel alive. This talk explores how blending hardware hacking with art creates functional and emotional storytelling, from explosive stunts to robots with personality, these projects blur the lines between disciplines.

Aaron Eiche
The Magic of Electropermanent Magnets!

Electropermanent magnets are like magic, an electromagnet but permanently switchable with a bit of current and a few microseconds. Aaron shares the adventures in using cheap off-the-shelf components to build his own and how to make them work empirically.

Fangzheng Liu
CircuitScout: Probing PCBs the Easy Way

Debugging PCBs can be challenging and time-consuming. This talk dives into the open-source DIY project, CircuitScout. This small desktop machine system automates debugging by selecting pads from your schematic, locating them, and controlling a probe machine for safe, hands-free testing.

Joe Needleman
From Sunlight to Silicon

AI workloads consume significant energy, but what if it didn’t? This hands-on session shows how to design and run a solar-powered computer cluster, focusing on NVIDIA Jetson Orin hardware, efficient power pipelines, and software strategies for high performance under tight energy limits.

John Duffy
The Circuits Behind Your Multimeter

Everyone uses a multimeter, but do you know what’s inside? This talk explores the inner workings, plus insights from building one, the design choices, and the tradeoffs behind common models. Discover the hidden engineering that makes this everyday tool accurate, safe, and reliable.

Josh Martin
DIY Depth: Shooting and Printing 3D Images

3D photography isn’t just for vintage nerds or high-end tech! Learn how stereoscopic film cameras work, the mechanics of lenticular lenses and how to print convincing 3D images at home, plus dive into digitizing, aligning, and processing 3D images from analog sources.

Kay Antoniak
From bytes to bobbins: Driving an embroidery machine

This talk explores how an embroidery machine brings out the best of tinkering: production, customization, and creative hacks. Learn how to run your first job on that dusty makerspace machine, create your own patch using open-source tools, and see what extra capabilities lie beyond the basics.

Keith Penney
Ghostbus: Simpler CSR Handling in Verilog

Designing FPGA applications means wrangling CSRs and connecting busses, a tedious & error-prone task. This talk introduces Ghostbus, an approach that automates address assignment and bus routing entirely in Verilog to keep designs clean, maintainable, and functional.

Kumar Abhishek
Laser ablating PCBs

Once too expensive, PCB fabrication via laser ablation of copper is now accessible via commodity fiber laser engravers. This talk shares experiences in making boards using this chemical-free technique and how it can help in rapid prototyping.

Karl Koscher
rtlsdr.tv: Broadcast TV in your browser

This talk introduces rtlsdr.tv and will cover the basics of digital video streams, programmatically feeding live content to video through Media Source Extensions, and using WebUSB to interact with devices that previously required kernel drivers.

If you’re still here, get your tickets!


hackaday.com/2025/10/07/2025-h…



Renault e Dacia: violazione dati personali clienti UK


I clienti britannici di Renault e Dacia sono stati informati di una violazione dei dati personali. La violazione, secondo quanto riferito, si è verificata presso un fornitore terzo.

La casa automobilistica francese (Dacia è una sussidiaria di Renault), che impiega oltre 170.000 persone e produce 2,2 milioni di veicoli all’anno, ha riferito che la perdita ha interessato solo i clienti delle sue divisioni nel Regno Unito. Ha sottolineato che l’incidente era collegato a un “appaltatore terzo” non identificato e che i sistemi di Renault non erano stati interessati.

“Siamo spiacenti di informarvi che uno dei nostri partner è stato vittima di un attacco informatico, che ha causato il furto di dati personali di alcuni clienti Renault UK”, ha affermato l’azienda in una nota.

Tra i dati compromessi caduti nelle mani degli hacker rientrano:

  • nome e cognome;
  • pavimento;
  • numero di telefono;
  • indirizzo e-mail;
  • indirizzo postale;
  • Codice VIN del veicolo;
  • numero di registrazione.

Questo set di dati potrebbe essere utilizzato da aggressori per attacchi di phishing, frodi e ingegneria sociale. Renault sottolinea che le informazioni bancarie e finanziarie dei clienti non sono state compromesse.

L’azienda aggiunge che l’appaltatore interessato ha contenuto l’incidente ed eliminato la minaccia sulle sue reti. Le autorità di regolamentazione britanniche, tra cui l’Information Commissioner’s Office (ICO), sono già state informate dell’attacco informatico.

Si consiglia ai clienti di prestare attenzione, di non rispondere a chiamate o e-mail sospette e di non condividere le proprie password con nessuno.

L'articolo Renault e Dacia: violazione dati personali clienti UK proviene da il blog della sicurezza informatica.




Puglia, Fnsi e Assostampa al fianco di Marilù Mastrogiovanni


@Giornalismo e disordine informativo
articolo21.org/2025/10/puglia-…
Calvario giudiziario infinito per la giornalista pugliese Marilù Mastrogiovanni, direttrice del giornale d’inchiesta ‘Il Tacco d’Italia’. A seguito dell’omicidio del boss Augustino Potenza



Noi non rischiamo di assuefarci


@Giornalismo e disordine informativo
articolo21.org/2025/10/noi-non…
«È diritto di chi è attaccato difendersi, ma anche la legittima difesa deve rispettare il parametro della proporzionalità. Purtroppo, la guerra che ne è scaturita ha avuto conseguenze disastrose e disumane. Mi colpisce e mi affligge il conteggio quotidiano dei morti in



se durante lo shutdown trump licenzia la metà dei dipendenti, la causa del licenziamento è lo shutdown o trump? a me sembra trump. come può esserci ambiguità su questo? io non lo capisco... ricordo che lo shutdown non comporta il licenziamento...


Ecco il programma della decima edizione di JAZZMI
freezonemagazine.com/news/ecco…
Nel 2025, JAZZMI celebra il suo decimo anniversario, un traguardo significativo che ne conferma il ruolo di riferimento per il jazz a Milano e oltre. In dieci anni, il festival ha trasformato un’idea in un progetto culturale stabile, riconosciuto a livello nazionale e internazionale, capace di raccontare il jazz nella sua dimensione più ampia, dinamica […]


"Il Patriarcato Ecumenico esprime la sua gioia per la prossima visita di Sua Santità Papa Leone XIV di Roma in Turchia, in risposta al desiderio espresso e all'invito di Sua Santità il Patriarca Ecumenico Bartolomeo di commemorare insieme lo storico …


"Trasmettere con gioia ai vostri figli e alle nuove generazioni i valori cristiani che hanno plasmato la vostra lunga storia e la vostra cultura".


Pirates win 18 seats in Czech parliament!


Congratulations to the Czech Pirates for their win in the October 3-4th parliamentary election. They went from four seats in the 2021 election when they were part of the Pirates and Mayors (STAN) alliance to eighteen seats in this election in alliance with the Greens. The Greens will get two of the eighteen seats.

The Czech Pirates are an inspiration to Pirates in the United States and around the world. They, like Pirates in Luxembourg are in their country’s legislatures and continue to fight for Pirate policies there.


masspirates.org/blog/2025/10/0…



Bypassing Sora 2's rudimentary safety features is easy and experts worry it'll lead to a new era of scams and disinformation.

Bypassing Sora 2x27;s rudimentary safety features is easy and experts worry itx27;ll lead to a new era of scams and disinformation.#News #AI


Sora 2 Watermark Removers Flood the Web


Sora 2, Open AI’s new AI video generator, puts a visual watermark on every video it generates. But the little cartoon-eyed cloud logo meant to help people distinguish between reality and AI-generated bullshit is easy to remove and there are half a dozen websites that will help anyone do it in a few minutes.

A simple search for “sora watermark” on any social media site will return links to places where a user can upload a Sora 2 video and remove the watermark. 404 Media tested three of these websites, and they all seamlessly removed the watermark from the video in a matter of seconds.
playlist.megaphone.fm?p=TBIEA2…
Hany Farid, a UC Berkeley professor and an expert on digitally manipulated images, said he’s not shocked at how fast people were able to remove watermarks from Sora 2 videos. “It was predictable,” he said. “Sora isn’t the first AI model to add visible watermarks and this isn’t the first time that within hours of these models being released, someone released code or a service to remove these watermarks.”
youtube.com/embed/QvkJlMWUUxU?…
Hours after its release on September 30, Sora 2 emerged as a copyright violation machine full of Nazi SpongeBobs and criminal Pickachus. Open AI has tamped down on that kind of content after the initial thrill of seeing Rick and Morty shill for crypto sent people scrambling to download the app. Now that the novelty is wearing off we’re grappling with the unpleasant fact that Open AI’s new tool is very good at making realistic videos that are hard to distinguish from reality.

To help us all from going mad, Open AI has offered watermarks. “At launch, all outputs carry a visible watermark,” Open AI said in a blog post. “All Sora videos also embed C2PA metadata—an industry-standard signature—and we maintain internal reverse-image and audio search tools that can trace videos back to Sora with high accuracy, building on successful systems from ChatGPT image generation and Sora 1.”

But experts say that those safeguards fall short. “A watermark (visual label) is not enough to prevent persistent nefarious users attempting to trick folks with AI generated content from Sora,” Rachel Tobac, CEO of SocialProof Security, told 404 Media.

Tobac also said she’s seen tools that dismantle AI-generated metadata by altering the content’s hue and brightness. “Unfortunately we are seeing these Watermark and Metadata Removal tools easily break that standard,” Tobac said of the C2PA metadata. “This standard will still work for less persistent AI slop generators, but will not stop dedicated bad actors from tricking people.”

As an example of how much trouble we’re in, Tobac pointed to an AI-generated video that went viral on TikTok over the weekend she called “stranger husband train.” In the video, a woman riding the subway cutely proposes marriage to a complete stranger sitting next to her. He accepts. One instance of the video has been liked almost 5 million times on TikTok. It didn’t have a watermark.

“We're already seeing relatively harmless AI Sora slop confusing even the savviest of Gen Z and Millennial users,” Tobac said. “With many typically-savvy commenters naming how ‘cooked’ we are because they believed it was real. This type of viral AI slop account will attempt to make as much money from the creator fund as possible before social media companies learn they need to invest in detecting and limiting AI slop, before their platform succumbs to the Slop Fest.”

But it’s not just the slop. It’s also the scams. “At its most innocuous, AI generated content without watermarking and metadata accelerates the enshittification of the internet and tricks people with inflammatory content,” Tobac said. “At its most malignant, AI generated content without watermarking and metadata could lead to every day people losing their savings in scams, becoming even more disenfranchised during election season, could tank a stock price within a few hours, could increase the tension between differing groups of people, and could inspire violence, terrorism, stampede or panic amongst everyday folks.”

Tobac showed 404 Media a few horrifying videos to illustrate her point. In one, a child pleads with their parents for bail money. In another, a woman tells the local news she’s going home after trying to vote because her polling place was shut down. In a third, Sam Altman tells a room that he can no longer keep Open AI afloat because the copyright cases have become too much to handle. All of the videos looked real. None of them have a watermark.

“All of these examples have one thing in common,” Tobac said. “They’re attempting to generate AI content for use off Sora 2’s platform on other social media to create mass or targeted confusion, harm, scams, dangerous action, or fear for everyday folk who don’t understand how believable AI can look now in 2025.”

Farid told 404 Media that Sora 2 wasn’t uniquely dangerous. It’s just one among many. “It is part of a continuum of AI models being able to create images and video that are passing through the uncanny valley,” he said. “Having said that, both Veo 3 and Sora 2 are big steps in our ability to create highly visual compelling videos. And, it seems likely that the same types of abuses we’ve seen in the past will be supercharged by these new powerful tools.”

According to Farid, Open AI is decent at employing strategies like watermarks, content credentials, and semantic guardrails to manage malicious use. But it doesn’t matter. “It is just a matter of time before someone else releases a model without these safeguards,” he said.

Both Tobac and Farid said that the ease at which people can remove watermarks from AI-generated content wasn’t a reason to stop using watermarks. “Using a watermark is the bare minimum for an organization attempting to minimize the harm that their AI video and audio tools create,” Tobac said, but she thinks the companies need to go further. “We will need to see a broad partnership between AI and Social Media companies to build in detection for scams/harmful content and AI labeling not only on the AI generation side, but also on the upload side for social media platforms. Social Media companies will also need to build large teams to manage the likely influx of AI generated social media video and audio content to detect and limit the reach for scammy and harmful content.”

Tech companies have, historically, been bad at that kind of moderation at scale.

“I’d like to know what OpenAI is doing to respond to how people are finding ways around their safeguards,” Farid said. “We are seeing, for example, Sora not allowing videos that reference Hitler in the prompt, but then users are finding workarounds by simply describing what Hitler looks like (e.g., black hair, black military outfit and a Charlie Chaplin mustache.) Will they adapt and strengthen their guardrails? Will they ban users from their platforms? If they are not aggressive here, then this is going to end badly for us all.”

Open AI did not respond to 404 Media’s request for comment.


#ai #News #x27


Court records show that the narrative Flock and a Texas Sheriff's Office has told the public isn't the whole story, and that police were conducting a 'death investigation' into the abortion.

Court records show that the narrative Flock and a Texas Sheriffx27;s Office has told the public isnx27;t the whole story, and that police were conducting a x27;death investigationx27; into the abortion.#Flock #Abortion


Police Said They Surveilled Woman Who Had an Abortion for Her 'Safety.' Court Records Show They Considered Charging Her With a Crime


In May, 404 Media reported that the Johnson County Sheriff’s Office in Texas searched a nationwide network of Flock cameras, a powerful AI-enabled license plate surveillance tool, to look for a woman who self-administered an abortion. At the time, the sheriff told us that the search had nothing to do with criminality and that they were concerned solely about the woman’s safety, specifically the idea that she could be bleeding to death from the abortion. Flock itself said “she was never under criminal investigation by Johnson County. She was being searched for as a missing person, not as a suspect of a crime.”

But newly unearthed court documents about the incident show that when the search was performed, police were conducting a “death investigation” into the death of the fetus, and police discussed whether they could charge the woman with a crime with the District Attorney’s office on the same day that they performed the Flock search. The documents, obtained by the Electronic Frontier Foundation (EFF) and shared with 404 Media, also show that the Flock search was performed more than two weeks after the woman had the abortion. The documents were created as part of an arrest affidavit against the woman’s partner, who was arrested for allegedly abusing and threatening her at gunpoint on the day she took the abortion pill.

In documents created prior to the publication of our article, there is zero mention of concern about the woman’s safety. The records show that the police retroactively created a separate document about the Flock search a week after our article was published, in which they justify the search by saying they were concerned for her safety.

404 Media’s initial reporting on the incident became national news, has been cited in several government investigations into how Flock is used by police, and has led to several reforms by Flock itself. The company and its CEO, Garrett Langley, have repeatedly used it as a high-profile example of an ‘activist’ media that is biased against his company. The documents show that the narrative pushed by the Johnson County Sheriff’s Office and repeated by Flock is not the full story, and that police did consider charging the woman with a crime.

“For months, Flock Safety and the Johnson County Sheriff insisted that she was being searched for as a missing person and accused journalists and advocates of spreading 'clickbait' misinformation,” Rin Alajaji, legislative activist at the EFF, told 404 Media. “Now we have the official records, and they prove the exact opposite: Texas deputies did investigate this woman's abortion as a ‘death investigation,’ they did use Flock Safety’s ALPR network to track her down, and they did consult prosecutors about charging her. The only misinformation came from the company and the sheriff trying to cover their tracks. We’ve warned about this for over a decade now: when a single search can access more than 83,000 cameras across nearly the entire country, the potential for abuse is enormous. This makes it crystal clear that neither the companies profiting from this technology nor the agencies deploying it can be trusted to tell the full story about how it's being used.”

The documents highlight how Flock, whose cameras are installed in thousands of communities around the country, and which 404 Media has revealed police use on behalf of ICE, ultimately may not know what its customers are using the technology for. Flock declined to comment for this article.

According to the documents obtained by the EFF and shared with 404 Media, police came to the woman’s house to investigate the incident on May 9, after the woman’s partner called the police to report that she had an abortion on April 23, more than two weeks earlier. The arrest report states that they had opened a “death investigation case” regarding the fetus. The woman was not at the house at the time, though there is no indication in the arrest report that the man or the police were concerned about her whereabouts at the time.

“The incident of the abortion/miscarriage occurred on April 23, 2025,” an affidavit for the arrest of her partner says. The partner told police that he was “unaware” that the woman “had ordered a medication, off the internet, from California, that would cause her to abort or miscarry.”

The woman “aborted/miscarried while he was outside and he came in and found blood in the bathroom with what he believed was the non-viable fetus,” it says. They “got into a verbal argument and she left and had not been back to [the house] since that day. [He] collected what he thought was the fetus and put it in the freezer. When [he] was asked why he waited so long to report the incident, his answer was he had to process the event and call his family attorney.”

“Detective [Calvin] Miller [a detective on the scene] was provided FedEx packaging the pill was sent in, photographs of what [the man] believed to be a fetus and the instructions on how to take the medication,” it adds.

Crucially, the affidavit notes “it was discussed at the time with the District Attorney’s Office and learned the State could not statutorily charge [the woman] for taking the pill to cause the abortion or miscarriage of the non-viable fetus.”

That same day, Johnson County Sheriff’s Department officials searched the national Flock network—consisting at the time of 88,345 cameras across the country—for the license plate belonging to a Land Rover. The stated reason was “had an abortion, search for female.” The documents do not say the time when the conversation with the District Attorney about possibly charging the woman took place, so it is unclear whether this happened before or after the Flock search. The Johnson County Sheriff’s Office and District Attorney’s Office did not respond to requests for comment for this article sent via email, phone, and fax.

Several days later, on May 14, the woman went to the police and told them that she wanted to tell them her side of the story. According to the affidavit, she said that her partner assaulted her the day she took the pill, and she showed them text messages “where they discussed her ordering the pill and taking the pill.” At some point on April 23, the day she took the pill, the two began arguing. The woman said the man allegedly put a gun to her head in front of the couple’s toddler. She says that he hit her with the butt of the gun, threw her on the bed, choked her, put the gun to her head and demanded that she “beg for your life.” “Scream all you want, no one can hear you, no one is coming to help you,” he said, according to the arrest report. “I’ll kill you right now and take off with the baby.” The man was arrested and charged with assault on May 22.

On May 28, nearly a week after the woman’s partner was arrested for assault, 404 Media learned of the May 9 Flock search by the Johnson County Sheriff’s Office using records that were obtained using a public records request. The documents showed thousands of Flock searches throughout the United States, and the reason police stated for doing a given search. We learned that Johnson County performed a search on a Land Rover for the reason of “had an abortion, search for female,” which was particularly notable because abortion rights experts have worried that police surveillance would be turned against women seeking abortions.

On May 29, we reached out to Flock for comment on the incident. Flock told us that the stated reason for the search was not the full story, and that we should call Johnson County Sheriff Adam King to learn more (we had already reached out to the sheriff’s office for comment). “According to the sheriff's office, the deputy did not search for a woman seeking an abortion. In fact, it appears as though the woman may have had self-induced wounds from an unsafe abortion, and the family called the sheriff's office looking for her because she went missing,” a Flock spokesperson said at the time.

404 Media called King, and had a nine-minute phone call with him, during which he asked multiple members of his staff for details about why the search was done and what happened. King told 404 Media that “I wanted to make sure y’all understood what that was: It wasn’t us trying to block a woman from having an abortion. It was a self-administered abortion she gave herself and her family was worried that she was going to bleed to death, and we were trying to find her to get her to a hospital. We weren’t trying to block her from leaving the state or whatever. That wasn’t the case. We just wanted to get her some medical help and that’s why we did the query on Flock.”

“The family was worried she was bleeding and needed immediate medical attention and we weren’t able to get her on the phone, they weren’t able to get her on the phone, that’s why we were checking Flock trying to find her, but it was for her safety,” he said. “That’s all it was about, her safety.”

The only family member mentioned in the court documents is the woman’s partner, who was arrested for allegedly abusing and threatening her. The Flock search is also not mentioned in the court documents, but it makes clear that the police were told at the time they learned about the abortion that it had actually taken place more than two weeks prior. There is no mention of concern about the woman’s safety in the narrative of events in the arrest report, though there is discussion of police considering whether they would be allowed to charge her with a crime.

On June 5, more than a week after 404 Media’s article was published and following subsequent national attention on the story, the Johnson County Sheriff’s Office created a new “supplemental report” about the incident in which the officer who ran the Flock search retroactively explained that he was worried about the woman’s safety and used both Flock and another powerful surveillance tool, TLO, to look her up. This supplemental report was also obtained by the EFF and shared with 404 Media.

“Deputies started to ask communication’s [sic] about looking up the victim due to a large amount of blood being found in the residence,” it states. “I never made scene on this call, just was assisting with trying to locate the victim and her children to check their welfare. I began to believe the victim may have been hurt by the [reporting person, the woman’s partner] due to the call and it not making sense […] I wanted to use resources available to help find where the victim and her children could be to make sure they were okay.”

The report, which does not mention the word “abortion” anywhere, then states that they found her license plate and an address in Dallas. The officer ran a Flock search as well as “a TLO report,” which gave him an additional address to search. TLO is a powerful lookup tool that uses information pulled from credit report header data. 404 Media has reported extensively on this tool in the past.
The case supplemental report shows it was created only after our article was initially publishedFrom the case supplemental report, created June 5
“I entered the vehicle into FLOCK to see if we could see where the victim and her children might be at due to multiple different locations being given for the victim and her children. Deputies had attempted to try and contact the female, but were unsuccessful. The FLOCK hit showed the victim had been in Dallas prior but nothing recent. The reason for the FLOCK search was to find out what city the victim and her children might be in and give us an idea of where to look for them, due to the large area of where the victim and her children cold [sic] be at.”

On June 13, King separately told the Dallas Morning News that “There was no big conspiracy there to be the abortion police [...] That wasn’t our deal, it was all about her safety.” The Dallas Morning News cited a “partial report” that it obtained which appears to be this June 5 document, which notes the “large amount of blood.”

Since we first reported on this incident, Flock and its CEO, Garrett Langley, have repeatedly stated that our reporting on the incident and an EFF blog post about it was “clickbait,” misleading, and that it oversold what happened in Johnson County. It is not clear if Flock has seen the arrest report or what Johnson County Sheriff’s Office told the company. But Flock and Langley have used King’s initial narrative of the incident to criticize media reporting of the company.

“In this case, it was an unfortunate example of where an activist journalist had a narrative in their mind and they didn’t want to look at the facts of the story, because the facts are, we have one of the most transparent systems one could build,” Langley told Forbes last month. “There was a single word ‘abortion,’ in the search. The natural conclusion is, ‘Oh, they’re searching for this woman because she had an abortion.’ But when you talk to the police department, it’s actually quite a more nuanced story, which is the family called the police department because they were worried for her well-being. It was a missing person’s case because she did administer a self-abortion. They found that woman not too far away eventually. And so when I look at this, I go ‘This is everything’s working as it should be.’”

“A family was concerned for a family member. They used Flock to help find her when she could have been unwell. She was physically OK, which is great, but due to the current political climate, this was really good clickbait,” Langley said.

The only adult “family member” of the woman who’s mentioned in police reports is her partner, who the woman left after he attacked her with a gun.

Flock and Langley also posted a blog in the aftermath of our reporting and the EFF’s own blog post about the incident in which he said the story was “clickbait-driven reporting and social media rumors,” about the case, and that the Texas abortion case “was purposefully misleading reporting.”

The EFF, he wrote, “is actively perpetuating narratives that have been proven false, even after the record has been corrected.”

“The Sheriff’s Office has reported that a local family called to ask for help–a relative had self-administered an abortion and subsequently ran away. Her family feared she was hurt and asked the Sheriff’s deputy to search for her to the best of their abilities. Deputies performed a nationwide search in Flock, the broadest search possible within the system, to try to locate her as quickly as they could,” Langley wrote. “Luckily, she was found safe and healthy in Dallas a couple of days later. No charges were ever filed against the woman and she was never under criminal investigation by Johnson County. She was being searched for as a missing person, not as a suspect of a crime.”

King, the Johnson County Sheriff, previously told 404 Media Flock was not responsible for ultimately finding the woman.

Separately, King was arrested by his own deputies in August on charges of harassing multiple female members of his staff and threatening to arrest them after they reported the harassment. King allegedly made repeated comments about the women’s appearance. Last week, King was additionally charged with aggravated perjury after allegedly lying to a grand jury about what happened. As part of his bond agreement, he has been ordered by a court to not perform background checks on his alleged victims, is not allowed access to “Global Positioning System Data” from Johnson County, and is not allowed access to a video surveillance system owned by the county.

“This update is so disappointing,” a Flock source said when 404 Media told them about the new details of the case. 404 Media granted multiple current and former Flock employees anonymity because they were not permitted to speak to the press. “As much as Flock tries to be good stewards of the powerful tech we sell, this shows it really is up to users to serve their communities in good faith. Selling to law-enforcement is tricky because we assume they will use our tech to do good and then just have to hope we're right.”

The Flock source added “Even if Flock took a stance on permitted use-cases, a motivated user could simply lie about why they're performing a search. We can never 100% know how or why our tools are being used.” A second Flock source said they believe Flock should develop a better idea of what its clients are using the company’s technology for.

“Reproductive dragnets are not hypothetical concerns. These surveillance tactics open the door for overzealous, anti-abortion state actors to amass data to build cases against people for their abortion care and pregnancy outcomes,” Ashley Kurzweil, senior policy analyst in reproductive health and rights at the National Partnership for Women & Families, told 404 Media. “Law enforcement exploitation of mass surveillance infrastructure for reproductive health criminalization promises to be increasingly disruptive to the entire abortion access and pregnancy care landscape. The prevalence of these harmful data practices and risks of legal action drive real fear among abortion seekers and helpers—even intimidating people from getting the care they need,” she added.

“Given Flock's total failure to prevent abuses, law enforcement that have paid for this surveillance technology should immediately lock down their settings for which other agencies can access their data, and should seriously reconsider whether this technology should be installed in their communities in the first place,” Senator Ron Wyden told 404 Media in a statement. “And Republican officials need to stop harassing and harming women.”


Women's Voices Channel reshared this.