Salta al contenuto principale



Parte da Milano il Nazra Festival. Cortometraggi che raccontano la Palestina


@Notizie dall'Italia e dal mondo
Con 80 opere in concorso, 20 finalisti e 4 vincitori, il festival itinerante presenta un programma denso di eventi e ospiti in quattro giornate inaugurali, dal 9 al 12 ottobre
L'articolo Parte da Milano il Nazra Festival. Cortometraggi che raccontano la



Difesa Ue, il Consiglio apre ai fondi comuni

@Notizie dall'Italia e dal mondo

Da mesi, nei corridoi di Bruxelles, si avverte la sensazione che qualcosa stia cambiando. Tra discussioni su bilanci, vincoli e priorità comuni, la difesa europea inizia a trasformarsi da esercizio diplomatico a progetto economico concreto. Oggi il Consiglio ha approvato la propria posizione sul pacchetto che incentiva gli



Il partito e il popolo: la resistenza del Pkk come fucina identitaria ad Amed


@Notizie dall'Italia e dal mondo
Il seguente reportage si basa su diversi viaggi in Bakur tra l’ottobre 2023 e l’aprile 2025 Con lo scioglimento ufficiale del Partito dei lavoratori del Kurdistan (annunciato lunedì 12 maggio 2025 dalla stessa organizzazione) è terminata un’esperienza storica di



Pordenone Linux User Group aps – PNLUG - Linux Day 2025


pnlug.it/2025/10/07/linux-day-…
Segnalato da Linux Italia e pubblicato sulla comunità Lemmy @GNU/Linux Italia
Ciao a tutti gli appassionati di tecnologia, agli sviluppatori, ai curiosi e a chiunque sia interessato al futuro digitale! Siamo […]

reshared this




We talk all about Sora 2, Apple and Google removing ICE-spotting apps, and a massive update to our Flock reporting.#Podcast


Podcast: The Final Boss of AI Slop


We start this week with a couple of our articles about Sora 2, OpenAI’s new AI slop app. People are already using tools to remove watermarks from its AI-generated videos. Great! After the break, we talk about Apple and Google removing various ICE-spotting apps from their app stores, with Apple doing it after direct pressure from the U.S. government. In the subscribers-only section, we have a substantial update to a story concerning Flock and a woman who self-administered an abortion.
playlist.megaphone.fm?e=TBIEA5…
Listen to the weekly podcast on Apple Podcasts,Spotify, or YouTube. Become a paid subscriber for access to this episode's bonus content and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.
youtube.com/embed/fTz5ODv_uZQ?…






New leaked documents show how the FBI convinced a judge to let its partners collect a mass of encrypted messages from thousands of phones around the world.#News


Cocaine in Private Jets and Sex Toys: What the FBI Found on its Secretly Backdoored Chat App


Private jets loaded with cocaine landing at an airport in Germany. A trafficker stuffing a racing sail boat with drugs and entering a tournament to blend in with other racers before speeding off. Vacuum-sealed layers of methamphetamine inside solar panels. And nearly 60 kilograms of drugs hidden inside a shipment of sex toys.

These are just some of the examples included in a cache of leaked U.S. Department of Justice documents the FBI used to convince a judge to let them continue harvesting messages from Anom. Anom was an encrypted phone and app the FBI secretly took over, backdoored, and ran for years as a tech company popular with organized crime around the world. The Anom operation, dubbed Trojan Shield, was the largest sting operation ever.

The documents provide more insight into the sorts of criminals swept up in the FBI’s investigation, and give behind-the-scenes detail on how exactly the FBI obtained legal approval for such a gigantic, and to some controversial, operation. The leaked documents include the original court orders from Lithuania, which assisted the FBI in collecting the data from Anom devices worldwide, and the FBI’s supporting documentation for those court orders. The documents were not supposed to be released publicly, but someone posted them anonymously online.

💡
Do you know anything else about Anom, Sky, Encrochat, or other encrypted phone companies? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

“Like I said this Turbo crew are the Pablo Escobar of this time in that area and got full control there,” one message written by an alleged drug trafficker included in the documents reads.

404 Media showed sections of the documents to people with direct knowledge of the operation who said they appeared authentic. Finnish outlet Yle reported on some of their contents at the end of September, but 404 Media is publishing copies of the documents themselves.

In 2018 the FBI shut down an encrypted phone company called Phantom Secure. In the wake of that, a seller from Phantom Secure and another popular company called Sky offered U.S. authorities their own, in-development encrypted device: Anom. The FBI then took Anom under its wing and oversaw a backdoor placed into the app. This involved adding a “ghost” contact to every group chat and direct message across the platform. The operation started in Australia as a beta test, before expanding to Europe, South America, and other parts of the world, sweeping up messages from cartels to biker gangs to hitmen to money launderers.
A screenshot from the documents.
Some of the documents are formal requests for continued assistance from the U.S. to Lithuania and spell out the sort of criminal activity the FBI has seen on the Anom platform. Several sections name specific and well-known drug traffickers. One is Maximillian Rivkin, also known as “Microsoft.” As I chronicled in my book about Anom, Rivkin was a devilishly creative drug trafficker, constantly making new schemes to smuggle cocaine or other narcotics. The new documents say Rivkin’s Serbia-based organized crime group was involved in the trafficking of hundreds of kilograms of cocaine between South America and Spain. To move the drugs, the group sailed a boat during a November 2020 regatta, a sailing race, “where their travel will be obscured by other boats and sail to the Caribbean,” the documents say. Around two or three weeks later, the boat would then return to Europe with the cocaine, before being dropped off the coast of Spain where another member of the group would pick it up, the documents add.

In another instance Rivkin’s group smuggled cocaine base within juice bottles from Colombia to Europe, according to the documents. In my book, I found Rivkin planned to do something similar with energy drinks.

These sorts of audacious, over-the-top drug smuggling operations were a common sight on Anom, according to my own review of hundreds of thousands of Anom text messages between drug traffickers I previously obtained. The new documents also specifically name Hakan Ayik, who was the head of the so-called Aussie Cartel, which controlled as much as a third of all drug importation into Australia, and who at one point was Australia’s most wanted criminal. Ayik discussed sending a massive 900 kilograms of cocaine through Malaysia to Australia concealed within shipments of scrap metal, according to the documents.

“Can you give me roughly the coordinates where’s the better place to meet outside Indonesian waters,” Ayik, using the moniker Oscar, said in one of the messages included in the documents.
playlist.megaphone.fm?p=TBIEA2…
Both Rivkin and Ayik were later arrested by Turkish authorities. Ayik was also known as the “encryption king,” likely due to his prolific selling of encrypted communication devices to organized criminals.

Other examples in the documents include a Dutch drug trafficking group involving a man called Guiliano Domenico Azzarito. That group smuggled cocaine between South America and Europe with private jet flights into small and medium sized airports the group controls, according to the documents. “Look we can move 20 tons easily every month from here in the future,” one message said.

Another describes Baris Tukel, a high-ranking Comanchero motorcycle gang member who was later charged by the U.S. for helping to spread Anom devices, discussing plans to hide methamphetamine and MDMA in marble tiles. In another case, a drug trafficker with the username RealG discussed smuggling drugs on a sailboat, inside shipments of bananas and hides, and cocaine base hidden inside fertilizer.

In September 2020, a drug trafficking group smuggled a shipment of cocaine and methamphetamine from the UK, through Singapore, to Australia, according to the documents. Authorities later searched the shipment, and found nearly 60 kilograms of drugs “concealed within 21 boxes of sex toys,” the documents say.
A screenshot from the documents.
The messages included in the document also detail some of the extreme violence Anom users engaged in. Simon Bekiri, a Comanchero member, discussed an assault against a rival gang, according to the documents. “I even pistol whipped him 3 times and blood was squirting out of his head almost a meter high in time with his heartbeat (That part was really funny),” one of the messages reads. “But when you say I pistol whipped him, shot him, bashed him and then took off in his car I’ll admit it does sound violent.”

These examples were used to help convince a Lithuanian judge to allow local authorities to continue providing the FBI with Anom messages. In an unusual legal workaround, instead of running the Anom collection server in the U.S., which may have created more legal headaches, the Department of Justice arranged for it to be run in Lithuania. Lithuanian authorities then provided a regular stream of collected Anom messages to the FBI. In all, Anom grew to 12,000 devices and the FBI collected tens of millions of messages before shutting the network down in June 2021.

404 Media first revealed in September 2023 Lithuania was the so-called “third country” that harvested the messages for the FBI. The Department of Justice has never formally acknowledged Lithuania’s role despite the leaked documents further corroborating 404 Media’s reporting.


#News

Breaking News Channel reshared this.



#NextGenAI, a Napoli da oggi fino a lunedì 13 ottobre!

La cerimonia di presentazione, del primo summit internazionale sull’Intelligenza Artificiale nella #scuola, si terrà oggi 8 ottobre, dalle ore 16.



Ondata di attacchi contro Palo Alto Networks: oltre 2.200 IP coinvolti nella nuova campagna


A partire dal 7 ottobre 2025, si è verificata un’intensificazione su larga scala di attacchi specifici contro i portali di accesso GlobalProtect di Palo Alto Networks, PAN-OS. Oltre 2.200 indirizzi IP unici sono stati coinvolti in attività di ricognizione.

Un notevole incremento è stato rilevato rispetto ai 1.300 indirizzi IP iniziali rilevati solo pochi giorni prima. Secondo il monitoraggio di GreyNoise Intelligence, questo rappresenta l’attività di scansione più intensa degli ultimi 90 giorni.

Il 3 ottobre 2025, un’impennata significativa dell’attività di scansione, pari al 500%, ha contrassegnato l’inizio della campagna di ricognizione. In quel giorno, sono stati rilevati circa 1.300 indirizzi IP unici che stavano esplorando i portali di accesso di Palo Alto. Rispetto ai tre mesi precedenti, questo picco iniziale di attività ha costituito il più alto livello di scansioni registrate.

Nei 90 giorni che hanno preceduto tale evento, i volumi giornalieri di scansioni non avevano quasi mai raggiunto la soglia dei 200 IP.

L’analisi condotta da GreyNoise ha messo in luce che una quota preponderante degli indirizzi IP nocivi, ben il 91%, risulta essere ubicata negli Stati Uniti. Si rilevano inoltre altri nuclei concentrati di tali indirizzi rispettivamente nel Regno Unito, nei Paesi Bassi, in Canada e nella Russia.

Un sostanziale investimento infrastrutturale per tale operazione è evidenziato dal fatto che gli specialisti della sicurezza hanno individuato intorno al 12% delle subnet ASN11878 complessivamente dedicate alla scansione dei gate di accesso Palo. E’ probabile che gli artefici della minaccia stiano esaminando in modo sistematico ampi database di credenziali, visti i pattern di autenticazione falliti che fanno supporre l’utilizzo di operazioni automatizzate brute-force nei confronti dei portali GlobalProtect SSL VPN.

GreyNoise ha reso pubblico un dataset esaustivo che include nomi utente e password univoci ricavati dai tentativi di login a Palo monitorati, in modo da permettere ai team per la sicurezza di stimare l’eventuale esposizione delle credenziali. Dall’analisi tecnica emerge che il 93% degli indirizzi IP coinvolti è stato etichettato come sospetto, mentre un 7% è stato giudicato dannoso.

L’esame delle attività di scansione rivela la presenza di diversi pattern di aggregazione a livello regionale contraddistinti da impronte TCP uniche, il che fa supporre l’esistenza di vari gruppi di minacce organizzate che agiscono in concomitanza. Gli studiosi nel campo della sicurezza hanno rilevato possibili legami tra la serie di scansioni registrata a Palo Alto e le operazioni di esplorazione condotte simultaneamente contro dispositivi Cisco ASA.

Entrambe le campagne di attacco condividono impronte TCP dominanti legate all’infrastruttura nei Paesi Bassi, insieme a comportamenti di clustering regionale e caratteristiche degli strumenti simili. L’attacco multitecnologico suggerisce una campagna di ricognizione più ampia contro le soluzioni di accesso remoto aziendale.

L'articolo Ondata di attacchi contro Palo Alto Networks: oltre 2.200 IP coinvolti nella nuova campagna proviene da il blog della sicurezza informatica.



“Christ’s resurrection teaches us that no history is so marked by disappointment or sin that it cannot be visited by hope”, said Leo XVI in the catechesis for the weekly General Audience on Wednesday that focused on a “surprising aspect” of Christ's …



Autarchia? Vi spiego il senso della scelta italiana sui blindati

@Notizie dall'Italia e dal mondo

Ieri il Corriere della Sera, nell’annunciare la scelta di Krauss-Maffei di lasciare il progetto del carro franco-tedesco e di procedere in autonomia verso un Leopard 3, sottolineava in chiusura la scelta “autarchica” dell’Italia. In realtà, la scelta italiana circa l’indispensabile



Social media at a time of war


Social media at a time of war
WELCOME BACK TO DIGITAL POLITICS. I'm Mark Scott, and I have many feelings about Sora, OpenAI's new AI-generated social media platform. Many of which are encapsulated by this video by Casey Neistat. #FreeTheSlop.

— The world's largest platforms have failed to respond to the highest level of global conflict since World War II.

— The semiconductor wars between China and the United States are creating a massive barrier between the world's two largest economies.

— China's DeepSeek performs significantly worse than its US counterparts on a series of benchmark tests.

Let's get started:


WHEN PLATFORM GOVERNANCE MEETS GLOBAL CONFLICT


OCT 7 MARKED THE 2-YEAR ANNIVERSARY of Hamas militants attacking Israel, killing roughly 1,200 citizens and engulfing the region in a seemingly endless conflict. Tens of thousands of Palestinians have died, many more have been displaced, and attacks (or the threat of attack) against both Israelis and Jews, worldwide, have skyrocketed.

I won't pretend to understand the complexities of the Israeli-Hamas war (more on that here, here and here). But the last two years have seen a slow degradation of the checks and safeguards that social media companies once had in place to protect users from war-related content, propaganda and illegal content now rife wherever you look online.

First, let's be clear. This isn't just an Israeli-Hamas issue. As we hurtle toward the end of 2025, there are currently almost 60 active state-based conflicts worldwide and global peace is at its lowest level in 80 years, according to statistics from the Institute for Economics and Peace.

That is not social media's fault. As much as it's easy to blame TikTok, YouTube and Instagram for the ills of the world, real-world violence is baked into generational conflicts, multitudes of overlapping socio-economic issues and other analogue touch-points that have nothing to do with people swiping on their phones.

But it's also true the recent spike in global conflicts has come at a time of collective retrenchment on trust and safety issues from social media giants that, at the bare minimum, have failed to stop some of the offline violence from spreading widely within online communities. Again, there's a causation versus correlation issue here that we must be careful with. But at a time of heightened polarization (and not just in the US and Europe), the capacity for tech platforms to be used to foment real-world instability and violence has never been higher.

Before I get irate complaints from those of you working within these companies, social media platforms have clear terms of service supposed to limit war-related content from spreading among users. You can review them here, here, here and here. But there's one thing to have clear-cut rules, and it's another to actively implement them.

Thanks for reading the free monthly version of Digital Politics. Paid subscribers receive at least one newsletter a week. If that sounds like your jam, please sign up here.

Here's what paid subscribers read in September:
— A series of legal challenges to online safety legislation challenge how these rules are implemented; The unintended consequences of failing to define "tech sovereignty;" Where the money really goes within the chip industry. More here.
— What most people don't understand about Brussels' strategy toward technology; Unpicking the dual antitrust decisions against Google from Brussels and Washington; AI chatbots still return too much false information. More here.
— The next transatlantic trade dispute will be about digital antitrust, not online safety; Washington's new foreign policy ambitions toward AI; The US' spending spree on data centers. More here.
— An inside look into the United Nations' takeover of AI governance; How the United Kingdom embraced the US "AI Stack;" People view the spread of false information as a higher threat than a faltering global economy. More here.
— Washington's proposed deal to untangle TikTok US from Bytedance is not what it first appears; How social media companies are speaking from both sides of their mouths on online safety; AI's expected boost to global trade. More here.

Social media companies' neglect related to conflicts outside the Western world has been a feature for years (more on that here.) Now, that same level of omission has seeped into conflicts, including those within the Middle East and Ukraine, that are closer to home for the Western public.

There are many reasons for this shift.

Companies like Alphabet and Meta have pared back their commitments to independent fact-checking which provided at least some pushback to government and non-state efforts to peddle falsehoods associated with these global conflicts. A shift to crowdsourced fact-checking — initially rolled out by X, and then followed by Meta — has yet to fill that void. That's mostly because companies have found it difficult to find consensus among their users about often divisive topics (including those related to warfare) which is required before these crowdsourced fact-checks are published.

Social media platforms have similarly spent the last three years gutting their existing trust and safety teams to the point where the industry is on life support. This was initially done for economic reasons. Faced with a struggling advertising sector in 2022, company executives sought cost savings, wherever they could, and internal trust and safety teams felt the brunt of those efforts. Fast forward to 2025, and there has been an ideological shift to "free speech" among many of these firms which makes any form of content moderation anathema to the current (US-focused) zeitgeist.

Third: politics. The current White House's aversion to online safety is well known. So too is the US Congress' accusations that other country's digital regulation unfairly infringes on American citizens' First Amendment rights. But from India to Slovakia, there are growing local efforts to quell platforms' content moderation programs — and the associated domestic legislation that has sprouted up from Brazil to the United Kingdom. In that geopolitical context, social media firms have instituted a "go slow" on many of their internal systems — even if (at least in countries with existing online safety regulation) they still comply with domestic rules.

Making things more difficult is the platforms' increasingly adversarial relationship with outsiders seeking to hold these firms to account for their stated trust and safety policies. (Disclaimer: My day job puts me in this category, though my interactions with the companies remain cordial.) Researchers have found it increasingly difficult to access publicly-available social media data. Others have faced legal challenges to analyses which cast social media giants in an unfavorable light. Industry-linked funding for such independent "red-teaming" of platform weaknesses has fallen off a cliff.

Taken together, these four points represent a fundamental change in what had been, until now, a progressive multi-stakeholder approach to ridding global social media platforms of illegal and gruesome content — and not just related to warfare.

Before, companies, policymakers and outside groups worked together (often with difficulty) to make these social media networks a safe space for people to express themselves in ways that represented free speech rights and safeguarded individuals from hate. That coalition has now disintegrated amid a combination of hard-nosed economics, shifting geopolitics and fundamental differences over what constitutes tech companies' trust and safety obligations.

Each of the above points occurred separately. No one set out thinking that cutting back on internal trust and safety teams; ending relations with fact-checkers; kow-towing to a shift in geopolitics; and reducing ties to outside researchers would make it easier for conflict-related content to spread easily among these social media networks.

And yet, that is what happened.

Go onto any social media platform, and within a few clicks (if you know what you're doing), you can come face-to-face with gruesome war-torn content — or, at least, purportedly material associated with one of the 59 state-based conflicts active worldwide. Even if you're not seeking out such material, the collective pullback on trust and safety has raised the possibility that you will stumble over such content in your daily doomscroll.

That is the paradox we find ourselves in at the end of 2025.

In many ways, social media has become even more ingrained in everything from politics to the latest meme craze (cue: the rise of OpenAI's Sora.) But these platforms are less secure and protected than they have ever been — at a time when the world is engulfed in the highest level of subnational, national and regional warfare in multiple generations.


Chart of the Week


THE US CENTER FOR AI STANDARDS AND INNOVATION ran a series of tests — across four well-known sectors associated with the performance of large language models — between services offered by OpenAI, Anthropic and Deepseek.

You have to take these results with a pinch of salt, as they come from a US federal agency. But across the board, China's LLM performed significantly worse than its US rivals.
Social media at a time of warSource: Center for AI Standards and innovation


THE AI WARS: SEMICONDUCTOR EDITION


COMMON WISDOM IS THAT YOU NEED three elements to compete in the global race around artificial intelligence. In your "AI Stack," you need world-leading microchips, you need cloud computing infrastructure that's cheap and almost universal, and you need applications like large language models that can sit on top and drive user engagement. On that first component — semiconductors — China and the US are increasingly going down different paths.

Looking back, it almost was inevitable. Washington has long safeguarded world-leading chips (from both American firms and those of its allies) from Beijing via export bans and other strong-arm tactics. The goal: to ensure China's AI Stack was always one step behind its US counterpart.

Yet that strategy is starting to backfire. Yes, Western AI chips are still better than their Chinese equivalents. But the lack of access to such semiconductors has forced the world's second largest economy to invest billions in domestic production in the hopes of eventually catching up — and surpassing — the likes of Nvidia or Taiwan's Taiwan Semiconductor Manufacturing Company.

What has galvanized this Chinese resolve is the repeated efforts by both the Trump and Biden administrations to hobble Chinese firms' ability to access the latest semiconductors. In this never-ending 'will they, or won't they?' game of national security ping-pong, the Trump 2.0 administration agreed in August to allow Nvidia and AMD to sell pared-down versions of their latest chips to China — as long as they gave the US federal government a 15 percent slice of that export revenue. Principled diplomacy, it was not.

That plan appears to have backfired. Nvidia is now under an antitrust investigation from Chinese authorities for its takeover of Israeli chipmaker Mellanox in 2020. The Cyberspace Administration of China has also reportedly told the country's largest tech firms, including Alibaba, ByteDance and Baidu, to not buy Nvidia's semiconductor. Jensen Huang, chief executive of the US chip firm, said he was "disappointed" with that move (which has never been officially confirmed.)

If you're interested in sponsoring Digital Politics, please get in touch on digitalpolitics@protonmail.com

Nvidia has invested millions to design China-specific microchips that both meet the national security limitations demanded by Washington and can be sold directly into the Middle Kingdom in ways that placate Beijing. If Chinese officials close the door — and require local firms to use domestic alternatives, many of which are reportedly almost on par with their Western rivals — then it's another indicator the US and China are on diverging paths when it comes to technological development.

Again, a lot of this was foreseeable. Repeated White House administrations urged American and Western chip and equipment firms to steer clear of China. In response, Beijing invested billions into local semiconductor production, much of which has remained at the lower level of sophistication. But as in other tech-related industries, Chinese manufacturers have steadily risen through the stack to now offer world-beating hardware. It's not unusual for that, eventually, to be the case in semiconductors.

Sign up for Digital Politics


Thanks for getting this far. Enjoyed what you've read? Why not receive weekly updates on how the worlds of technology and politics are colliding like never before. The first two weeks of any paid subscription are free.

Subscribe
Email sent! Check your inbox to complete your signup.


No spam. Unsubscribe anytime.

What does this all mean for the politics of technology?

First, Western semiconductor firms offering pared-back versions of their latest chips to China may have the door shut on them. Beijing may need these manufacturers, in the short term. But don't expect that welcome to remain warm — especially as Western officials continue to rattle sabres.

Second, the need for Chinese firms to rely on (currently sub-par, but rapidly advancing) homegrown chips will lead to scrappy innovation once associated just with Silicon Valley. We can debate whether the meteoric rise of DeepSeek was truly as unique as first believed (based on the company's ties to the wider Chinese tech ecosystem.) But relying on second-tier semiconductors will force Chinese AI firms to be more nimble compared to their US counterparts with seemingly unlimited access to chips, compute power and data.

Third, the "splinternet" will come to hardware. I wrote this in 2017 to explain how the digital world was being balkanized into regional fiefdoms. The creation of rival semiconductor stacks — one led by the US, one led by China — will extend that division into the offline world. Companies will try to make the respective hardware interoperable. But it won't be in the interests of either party, as the separation expands between which semiconductors can work with other infrastructure worldwide, to maintain such networking capability.

In short, the global race between AI Stackshas entered a new era.


What I'm reading


— The Wikimedia Foundation published a human rights impact assessment on artificial intelligence and machine learning. More here.

— The European Centre of Excellence for Countering Hybrid Threats assessed the current strengths and weaknesses in the transatlantic fight against state-backed disinformation. More here.

— The Canadian government launched an AI Strategy Task Force and outlined its agenda for public feedback on the emerging technology. More here.

— The Appeals Centre Europe, which allows citizens to seek redress from social media companies under the EU's Digital Services Act, published its first transparency report. More here.

— Researchers outlined the growing differences between how countries are approaching the oversight and governance of artificial intelligence for the University of Oxford. More here.



digitalpolitics.co/newsletter0…



Homebrew Dam Control System Includes all the Bells and Whistles


The site controller board

Over on brushless.zone, we’ve come across an interesting write-up that details the construction of a dam control system. This is actually the second part, in the first, we learn that some friends purchased an old dysfunctional 80 kW dam with the intention of restoring it. One friend was in charge of the business paperwork, one friend the mechanical side of things, and the other was responsible for the electronics — you can probably guess which ones we’re interested in.

The site controller is built around a Nucleo-H753 featuring the STM32H753ZI microcontroller, which was selected due to it being the largest single-core version of the dev board available. This site controller board features a dozen output light switches, sixteen front-panel button inputs, dual 24 V PSU inputs, multiple non-isolated analog inputs, atmospheric pressure and temperature sensors, multiple analog multiplexers, a pair of SSD1309 OLED screens, and an ESP32 for internet connectivity. There’s also fiber optic TX and RX for talking to the valve controller, a trio of isolated hall-effect current sensors for measuring the generator phase current, through current transformers, four contactor outputs (a contactor is a high-current relay), a line voltage ADC, and the cherry on top — an electronic buzzer.

The valve controller has: 48 V input from either the PSU or battery, motor phase output, motor field drive output, 8 kV rated isolation relay, limit switch input, the other side of the optical fiber TX and RX for talking to the site controller board, and connectors for various purposes.

If you’re interested in seeing this dam control system being tested, checkout the video embedded below.

youtube.com/embed/8laQxXGqc38?…


hackaday.com/2025/10/08/homebr…



Qualcomm acquisisce Arduino per rafforzare la presenza nell’IoT e nella robotica


Qualcomm ha annunciato martedì l’acquisizione di Arduino, azienda italiana nota per la produzione di circuiti stampati programmabili a basso costo. La società, che diventerà una sussidiaria indipendente del colosso statunitense, rappresenta un tassello strategico nel piano di Qualcomm per rafforzare la propria presenza nel settore della robotica e dell’Internet of Things (IoT).
Il valore economico dell’operazione non è stato reso pubblico.

L’acquisizione permette a Qualcomm di entrare in contatto diretto con la base della comunità dei maker, degli hobbisti e delle startup di robotica. I prodotti Arduino, pur non essendo destinati all’uso commerciale, sono strumenti essenziali per la prototipazione e la sperimentazione di nuove idee grazie alla loro semplicità e accessibilità.

Secondo Nakul Duggal, direttore generale di Qualcomm per i settori automotive, industriale e embedded IoT, la partnership consentirà agli sviluppatori di iniziare dai prototipi per poi passare alla produzione commerciale, un ambito in cui Qualcomm vanta un’ampia esperienza.

La strategia dell’azienda arriva in un momento di stagnazione nel mercato degli smartphone e di crescente indipendenza di Apple nello sviluppo dei propri chip modem. Qualcomm sta così diversificando le sue fonti di ricavo, spostando l’attenzione verso robotica, veicoli connessi e applicazioni industriali. Nel trimestre più recente, infatti, le attività legate all’IoT e al settore automotive hanno rappresentato circa il 30% delle vendite complessive di chip.

Per anni, i prodotti Qualcomm sono stati poco accessibili ai piccoli sviluppatori, poiché venduti principalmente in grandi lotti a imprese consolidate. Al contrario, concorrenti come Nvidia hanno introdotto kit di sviluppo per la robotica acquistabili direttamente dai rivenditori a partire da 249 dollari, posizionandosi come punto di riferimento per la comunità degli sviluppatori.

Negli ultimi dodici mesi Qualcomm ha acquisito anche Foundries.io ed Edge Impulse, con l’obiettivo di potenziare le proprie soluzioni per la robotica e l’intelligenza artificiale. Duggal ha dichiarato che l’obiettivo finale è quello di fornire la potenza di calcolo necessaria a sostenere robot umanoidi, comparabile a quella utilizzata nelle auto a guida autonoma.

Contestualmente all’annuncio, Arduino ha presentato la sua prima scheda equipaggiata con un chip Qualcomm, denominata Uno Q. Il dispositivo, che sarà in vendita tra 45 e 55 dollari, integra il processore Dragonwing QRB2210, capace di eseguire software Linux e Arduino, oltre a funzioni di visione artificiale per l’analisi delle immagini provenienti da telecamere.

Tradizionalmente, le schede Arduino si basano su microcontrollori leggeri di produttori come STMicroelectronics, Renesas Electronics, Microchip e NXP Semiconductors, con prestazioni insufficienti per le applicazioni di intelligenza artificiale più avanzate. Qualcomm ha confermato che Arduino continuerà comunque a distribuire chip di questi marchi, mantenendo la compatibilità con l’ecosistema esistente.

L'articolo Qualcomm acquisisce Arduino per rafforzare la presenza nell’IoT e nella robotica proviene da il blog della sicurezza informatica.



“La Risurrezione di Cristo ci insegna che non c’è storia tanto segnata dalla delusione o dal peccato da non poter essere visitata dalla speranza.


La sovranista, donna, madre e cristiana Sempre più "sovranista", vero?


Gaza, l’Idf ferma la nuova Flotilla, 9 italiani a bordo. A Sharm Hamas apre al disarmo

[quote]GAZA – Un’altra Flotilla, un altro abbordaggio. La missione congiunta della Freedom Flotilla, che aveva raccolto il testimone della precedente spedizione, è stata fermata nella notte dall’esercito israeliano, a 120…
L'articolo Gaza, l’Idf ferma la nuova Flotilla, 9



Fallieuropa fallisce in tutto, politica, ricerca, democrazia, auto elettriche, politiche green, ecc. Solo per le buffonate eccelle...


giusto per capire quanto sia coglione e approssimativo questo governo


la germania ha bloccato chat control: un'idea liberticida. la gente critica la germania in italia, ma io rimango dell'idea che come cittadini italiani dobbiamo di più al governo tedesco che non a quello italiano. in italia poi abbiamo fascismo allo stato sempre-puro ed è ovvio che piaccia l'idea di un tecnocontrollo totale.


USB (Unione Sindacati di Base) ha aperto un CAF vicino alla mensa, stanno facendo volantinaggio per avvisare della cosa.

Uno ha preso il volantino e ha detto "USB che è, CGIL?".

Per dire come stiamo messi...



Il Comitato organizzatore locale (Col) della Giornata mondiale della gioventù di Seoul 2027 insieme al Dicastero per i Laici, la famiglia e la vita, annuncia il lancio del Concorso per l’inno della Gmg, invitando musicisti e compositori di tutto il m…




"Il camminare insieme è lo stile della Chiesa”. Lo scrive il Papa, nel messaggio inviato tramite il cardinale segretario di Stato, Piero Parolin, a dom Matteo Ferrari, priore generale della Congregazione Camaldolese dell’Ordine di San Benedetto, in o…






ORRIPILANTE!!! Sono state bloccate 9 barche della Sumud con a bordo medici, infermieri e medicinali ilfattoquotidiano.


Hacker nordcoreani: 2 miliardi di dollari rubati in criptovalute in nove mesi di frodi


Una rete di hacker legata alla Corea del Nord ha rubato oltre 2 miliardi di dollari in criptovalute nei primi nove mesi del 2025. Gli analisti di Elliptic definiscono questa cifra la più grande mai registrata, con tre mesi rimanenti alla fine dell’anno.

Si stima che l’importo totale rubato abbia superato i 6 miliardi di dollari e, secondo le Nazioni Unite e diverse agenzie governative, sono questi fondi a finanziare i programmi missilistici e di armi nucleari della Corea del Nord.

Secondo Elliptic, la cifra reale potrebbe essere più elevata, dato che risulta complicato attribuire a Pyongyang furti specifici, operazione che necessita di analisi blockchain, esami del riciclaggio di denaro e attività di intelligence. In alcuni casi, gli incidenti corrispondono solo in parte ai modelli caratteristici dei gruppi nordcoreani, mentre altri episodi potrebbero non essere stati segnalati.

La principale fonte di perdite record è stato l’attacco hacker di febbraio all’exchange Bybit , che ha portato al furto di 1,46 miliardi di dollari in criptovalute. Altri incidenti confermati quest’anno includono attacchi a LND.fi, WOO X e Seedify. Elliptic collega inoltre oltre 30 ulteriori incidenti non segnalati pubblicamente alla Corea del Nord. Questa cifra è quasi il triplo di quella dell’anno scorso e supera significativamente il precedente record stabilito nel 2022, quando furono registrati furti di asset da servizi come Ronin Network e Horizon Bridge.

Allo stesso tempo, il vettore di attacco è cambiato in modo significativo. Mentre in precedenza i criminali informatici sfruttavano le vulnerabilità nell’infrastruttura dei servizi crittografici, ora utilizzano sempre più spesso metodi di ingegneria sociale. Le principali perdite nel 2025 sono dovute all’inganno, non a difetti tecnici.

Gli utenti facoltosi privi di meccanismi di sicurezza aziendale sono a rischio. Vengono attaccati tramite contatti falsi, messaggi di phishing e schemi di comunicazione convincenti, a volte dovuti a connessioni con organizzazioni che detengono grandi quantità di asset digitali. Pertanto, l’anello debole del settore crittografico sta gradualmente diventando l’elemento umano.

Allo stesso tempo, si sta sviluppando una corsa tra analisti e riciclatori. Con l’aumentare dell’accuratezza degli strumenti di tracciamento blockchain, i criminali stanno diventando più sofisticati nei loro schemi per trasferire i beni rubati. Un recente rapporto di Elliptic descrive nuovi approcci per nascondere le loro tracce: mixaggio di transazioni in più fasi, trasferimenti cross-chain tra blockchain di Bitcoin, Ethereum, BTTC e Tron, l’uso di reti oscure con bassa copertura analitica e lo sfruttamento di “indirizzi di ritorno” che reindirizzano i fondi verso nuovi wallet. A volte, i criminali creano e scambiano i propri token emessi direttamente all’interno delle reti in cui avviene il riciclaggio. Tutto ciò trasforma le indagini in un gioco del gatto e del topo tra investigatori e gruppi altamente qualificati che operano sotto il controllo statale.

Tuttavia, la trasparenza della blockchain rimane un vantaggio chiave per le indagini. Ogni moneta rubata lascia una traccia digitale che può essere analizzata e collegata ad altre transazioni. Secondo i ricercatori, questo rende l’ecosistema delle criptovalute più resiliente e riduce la capacità della Corea del Nord di finanziare i suoi programmi militari.

I 2 miliardi di dollari rubati in soli nove mesi sono un segnale preoccupante della portata della minaccia. Le unità informatiche nordcoreane stanno diventando sempre più inventive, ma gli strumenti forensi basati sulla blockchain contribuiscono a mantenere l’equilibrio, garantendo trasparenza e aumentando la responsabilità degli operatori di mercato. Questa costante battaglia per il controllo dei flussi digitali sta decidendo non solo il destino del mercato delle criptovalute, ma anche questioni di sicurezza internazionale.

L'articolo Hacker nordcoreani: 2 miliardi di dollari rubati in criptovalute in nove mesi di frodi proviene da il blog della sicurezza informatica.



I preparativi erano iniziati da tempo. Si è anche creata una Commissione mista che sta lavorando per definire il programma e i dettagli della visita. Mancava solo l’annuncio della data ufficiale. Ora c’è.


FdI sceglie Cirielli per la Campania. Sì della Lega, ma FI frena: “Insultava Berlusconi”

[quote]ROMA – Fratelli d’Italia ha sciolto la riserva e ha annunciato con una nota che sosterrà il viceministro agli Esteri Edmondo Cirielli come prossimo presidente della Campania. “Voglio essere il…
L'articolo FdI sceglie Cirielli per la Campania. Sì della Lega, ma FI





Fragilità

@Politica interna, europea e internazionale

Le democrazie non sono deboli, sono fragili. La loro fragilità è preziosità e delicatezza, rientrano fra le cose umane che devono essere volute – meglio se amate – ma non imposte. Si può fermare, anche con la forza, chi voglia aggredire la libertà, ma non si può imporla a chi non la desidera e non […]
L'articolo Fragilità proviene da fondazioneluigieinaudi.it/frag…