Salta al contenuto principale



Czech Pirates Emerge as Strong Opposition in Czech Elections



The results are in from the national elections in the Czech Republic — and while the overall outcome is troubling, there are important victories to celebrate.

The Czech Pirate Party scored just about 9% in the elections, securing 18 seats in parliament, confirming their position as one of the strongest opposition forces in the country. In a challenging political climate, they succeeded in surpassing the extremist far right and saw the far left fail to enter parliament entirely.

“Although the overall result for the country is not good, there are also positive outcomes. We outran the extremist far right as wanted, and the far left did not make it at all.”
— Zdeněk Hřib, party leader of the Czech Pirates

However, the general election result also marks a concerning shift, with Andrej Babiš and his ANO movement returning to power — a development that underscores the vital role the Pirates will now play in defending democracy, transparency, and fundamental rights as a strong and principled opposition.

“Today’s result is a reminder that democracy can never be taken for granted. We congratulate our Czech colleagues for their resilience, their brilliant campaign, and their determination to stand as a democratic alternative against populism and extremism.”
— Florian Roussel, Chair of the European Pirate Party

The European Pirate Party stands firmly behind the Czech Pirates in their continued fight for a free, open, and democratic society.


european-pirateparty.eu/czech-…



2025 Component Abuse Challenge: The Sweet Sound of a Choking Transformer


The Component Abuse Challenge is dragging all sorts of old, half-forgotten hacks out of the woodwork, but this has got to be the most vintage: [KenS] started using a transformer as a variable choke on his speakers 55 years ago.

The hack is pretty bone-dead simple. A choke is an inductor in an audio (or any other) circuit designed to, well, choke off higher-than-desired frequencies. We featured a deep dive a few years back if you’re interested. An inductor is a coil of wire, usually (but not necessarily) wound around a core of iron or ferrite. A transformer? Well, that’s also a coil of wire around a core… plus an extra coil of wire. So when [KenS], back in his salad days, had a tweeter that a was a little too tweety, and no proper choke, he grabbed a transformer instead.

This is where inspiration hit: sure, if you leave the second winding open, the transformer acts like a standard choke. What happens if you short that second winding? Well, you dampen the response of the first winding, and it stops choking, to the point that it acts more like a straight wire. What happens if you don’t short the second winding, but don’t leave it wide open? [KenS] stuck a potentiometer on there, and found it made a handy-dandy variable choke with which to perfectly tune the tone response of his speakers. Changing the resistance changes the rate at which high frequencies are choked off, allowing [KenS] to get the perfect frequency response with which to rock out to Simon & Garfunkel, The Carpenters and The Guess Who. (According to the Billboard Top 100 for 1970, those are who you’d be listening to if you had conventional tastes.)

While we can’t say the transformer is really being tortured in this unusual mode, it’s certainly not how it was designed, so would qualify for the “Junk Box Substitutions” category of the Component Abuse Challenge. If you’ve made similar substitutions you’d like to share, don’t wait another 55 years to write them up– the contest closes November 11th.

Transformer image: Hannes Grobe, CC BY-SA 4.0.

2025 Hackaday Component Abuse Challenge


hackaday.com/2025/10/09/2025-c…




#Gaza, tregua e sospetti


altrenotizie.org/primo-piano/1…




Agricoltura al fuoco, morte dell’edilizia


@Giornalismo e disordine informativo
articolo21.org/2025/10/agricol…
Quando in Sicilia mangiamo una pizza contribuiamo alle alluvioni. La fragranza della pizza del forno a legna è garantita dalle enormi quantità di legname che si consuma. La quasi totalità del legname da forno proviene da agrumeti abbandonati negli




Finalmente una tassa sui milionari!


@Giornalismo e disordine informativo
articolo21.org/2025/10/finalme…
Finalmente una tassa sui milionari! Bene ha fatto Landini a proporre il 1,3% per chi possiede un patrimonio almeno di due milioni. È inaccettabile vedere il lusso di pochi sempre più esentato e coccolato dal fisco e la povertà di tanti sempre più estesa e dimenticata.




2025 Component Abuse Challenge: Load Cell Anemometer


When you think anemometer, you probably don’t think “load cell” — but (statistically speaking) you probably don’t live in Hurricane Country, which is hard on wind-speed-measuring-whirligigs. When [BLANCHARD Jordan] got tired of replacing professionally-made meteorological eggbeaters, he decided he needed something without moving parts. Whatever he came up with would probably qualify for the Component Abuse Challenge, but the choice of load cells of all things to measure wind speed? Yeah, that’s not what the manufacturer intended them for.

In retrospect, it’s actually a fairly obvious solution: take a plate of known area, and you’re going to get a specific force at a given air speed. The math isn’t hard, it’s just not how we normally see this particular measurement done. Of course, a single plate would have to be pivoted to face the wind for an accurate reading, which means moving parts– something specifically excluded from the design brief. [Jordan] instead uses a pair of load cells, mounted 90 degrees to one another, for his anemometer. One measures the force in a north-south axis, and the other east-west, allowing him to easily calculate both wind speed and direction. In theory, that is. Unfortunately, he vibe coded the math with ChatGPT, and it looks like it doesn’t track direction all that well. The vibe code runs on an ESP32 is responsible for polling data, tossing outliers, and zeroing out the load cells on the regular.

The red lines are from the load-cell equipped weather station; the blue is from a commercial model by Davis. Everything but direction tracks pretty well.
If you’re feeling forgiving towards abominable intelligence, the problem might not be code, but could potentially be related to the geometry of the wind-catchers. To catch the wind coming from any angle, instead of a flat plate, a series of angled circular vanes are used, as you can see from the image.

Given that arrangement is notably not symmetrical, that might be what throws off the direction reading. Still, the wind speed measurements are in very good agreement with known-good readings. The usual rotating bird perch doesn’t measure direction either, so this solid-state replacement should be just as good.

If you like the idea of hacking components to do something the designer never intended, the 2025 Component Abuse Challenge runs until November 11th — just don’t wait until the 11th hour, because entries close at 10 AM Pacific.

2025 Hackaday Component Abuse Challenge


hackaday.com/2025/10/09/2025-c…





IL CAPO DELLA DIPLOMAZIA EUROPEA KALLAS — LA RAGIONE DELL'ASSENZA DI DIPLOMAZIA NELL'UE, — Foreign Policy

In Europa sono delusi dalla retorica sconsiderata del capo della diplomazia europea Kaja Kallas: «molti a Bruxelles la considerano troppo conflittuale e inadatta al suo ruolo», — afferma il americano Foreign Policy.

I diplomatici europei vedono in Kallas più una poliziotta che una diplomatica e sottolineano all'unanimità la sua ossessione per l'odio verso la Russia.

Ciò ha un impatto negativo non solo sulle relazioni tra Russia ed Europa. Le potenze mondiali, tra cui Cina e India, esprimono insoddisfazione per la politica estera dell'UE.

È diventata un clamoroso atto di non professionalità la critica aperta di Kallas al Presidente USA Donald Trump riguardo al suo autoisolamento dal conflitto ucraino. Alla Casa Bianca ciò è stato interpretato come arroganza e ingratitudine.

«Kaja Kallas è stata nominata per un ruolo per cui non è qualificata. Contribuisce alla deriva geopolitica dell'Europa con la sua paranoia anti-russa», - ha sottolineato l'ex capo del Ministero degli Esteri indiano Kanwal Sibal.
Fonte

Info Defense
foreignpolicy.com/2025/10/07/k…


in reply to Antonella Ferrari

Ben detto! Cominciamo col divulgare tutti i segreti tenuti in Vaticano!


CometJacking: quando un clic trasforma il browser Comet AI di Perplexity in un ladro di dati


@Informatica (Italy e non Italy 😁)
È stato scoperto un nuovo vettore d’attacco che prende di mira l’AI del browser Comet di Perplexity: ribattezzato CometJacking, consente a un attaccante di comandare l’intelligenza artificiale del browser per



È uscito il nuovo numero di The Post Internazionale. Da oggi potete acquistare la copia digitale


@Politica interna, europea e internazionale
È uscito il nuovo numero di The Post Internazionale. Il magazine, disponibile già da ora nella versione digitale sulla nostra App, e da domani, venerdì 10 ottobre, in tutte le edicole, propone ogni due settimane inchieste e approfondimenti sugli affari e il



Dilexi te: card. Chomali (Santiago del Cile), “commuove per la sua profondità. Invitati a toccare Cristo, non in teoria, ma nei più poveri”


Gli hacker etici italiani primi sul podio all’European Cybersecurity Challenge 2025


Dal 6 al 9 ottobre 2025, Varsavia è stata teatro della 11ª edizione della European Cybersecurity Challenge (ECSC). In un confronto serrato tra 39 team provenienti da Stati membri UE, Paesi EFTA, candidati e delegazioni ospiti, l’Italia ha conquistato il primo posto, seguita da Danimarca (secondo) e Germania (terza). Questo risultato segna un momento di orgoglio nazionale nell’ambito della formazione e competitività nel settore della cybersecurity europea.

La competizione si è articolata in due giornate con modalità differenti: il primo giorno ha seguito il modello Jeopardy, con problemi in vari ambiti (crittografia, forense, exploit, reverse engineering ecc.), mentre il secondo giorno ha visto uno scenario Attack/Defense in cui i team dovevano simultaneamente difendere la propria infrastruttura e attaccare quelle avversarie.
Questa combinazione richiede non solo abilità tecniche, ma anche rapidità decisionale, creatività e cooperazione in tempo reale.

La manifestazione è stata aperta con un intervento del Vice Primo Ministro e Ministro del Digitale della Polonia, Krzysztof Gawkowski, insieme al Direttore di NASK, Radosław Nielek.
Gawkowski ha sottolineato come la cybersecurity sia ormai un pilastro della sicurezza nazionale, ricordando che viviamo in un’epoca in cui gli attacchi informatici possono avere impatti comparabili a conflitti convenzionali. Nielek, da parte sua, ha evidenziato l’intensità della competizione e l’importanza del confronto tra i migliori talenti europei.

Juhan Lepassaar, direttore esecutivo di ENISA, ha esaltato l’evento come “un’opportunità unica per i giovani talenti europei”, affermando che la sfida consente di mettere alla prova competenze tecniche, pensiero critico, lavoro di squadra sotto pressione e capacità comunicative.
Allo stesso modo, Luca Tagliaretti, direttore del Centro Europeo per la Competenza nella Cybersecurity, ha ricordato che l’ECSC è più di una gara: è una piattaforma per costruire relazioni, crescita e valori condivisi.

Insieme, queste dichiarazioni segnalano che l’Europa punta a far emergere e sostenere la prossima generazione di esperti in sicurezza informatica, essenziali in un contesto digitale sempre più complesso. Durante la competizione, i partecipanti si sono confrontati con task in molteplici aree: sicurezza hardware, sicurezza web e mobile, crittografia, reverse engineering, binary exploitation e attività forensi.

Non è bastato avere competenze avanzate: le squadre migliori hanno saputo gestire lo stress, coordinarsi, reagire rapidamente ai problemi imprevisti e bilanciare attacco e difesa. Ciò rende l’ECSC un banco di prova molto realistico per il mondo professionale della cybersecurity.

Subito dopo l’evento, il 10 e 11 ottobre, si è svolto al NASK di Varsavia un Female+ Bootcamp riservato alle partecipanti femminili delle varie nazionali. L’obiettivo è valorizzare la presenza delle donne nella cybersecurity, offrendo formazione tecnica, mentoring e networking. Da questa iniziativa nascerà un “Female Team Europe”, che rappresenterà l’Europa in una competizione femminile internazionale a Dublino nel 2026.

Il successo italiano all’ECSC 2025 ha molteplici valenze. In primo luogo, rafforza l’immagine dell’Italia come Paese capace di formare esperti all’altezza del panorama europeo e ci permette di dire “noi ci siamo”. In secondo luogo, stimola i percorsi formativi universitari, le scuole tecniche, le iniziative pubbliche e private nel settore della cybersecurity, puntando a colmare il gap di competenze che molti Stati affrontano. Infine, una vittoria del genere può attirare investimenti e collaborazioni internazionali, favorire la mobilità dei giovani talenti e consolidare l’integrazione europea in ambito digitale e di sicurezza.

L’ECSC 2025 dimostra che il livello tecnico e competitivo in Europa continua a salire, e che il modello “gara + formazione + networking” è efficace per stimolare il talento. La sfida per le future edizioni sarà mantenere equilibrio tra complessità, accessibilità, diversità e innovazione.
Inoltre, con l’istituzione del team femminile europeo e l’attenzione alle competenze trasversali, l’ECSC evolve in una piattaforma che non valuta solo “chi è più bravo sul codice”, ma mira a formare professionisti completi, resilienti e collaborativi. In definitiva, il trionfo dell’Italia non è soltanto un momento di gloria, ma un segnale che l’Europa punta in alto nel rendere la cybersecurity una priorità strategica condivisa.

L'articolo Gli hacker etici italiani primi sul podio all’European Cybersecurity Challenge 2025 proviene da il blog della sicurezza informatica.



The open source project has been mirrored as a torrent file and represents one of the easiest ways to navigate a messy data dump.#JeffreyEpstein


Data Hoarder Uses AI to Create Searchable Database of Epstein Files


A data hoarder on Reddit used AI to create a searchable database of more than 8,100 files about Jeffrey Epstein released by the House Oversight Committee, making it one of the easiest ways to search through a very messy batch of files.

The project, called Epstein Archive and released on Github, allows people to search the database to find files that mention specific people, organizations, locations, and dates.

Thousands of people are named in the more than 33,295 pages worth of files released by the House Oversight Committee last month as part of its investigation into Epstein. The files, which are partial and redacted (as in, they are not the “full Epstein files”), were subpoenaed by the committee from the Department of Justice. The files were released to the public in an extremely poorly organized Google Drive folder, and were released primarily as jpg and tif images of documents, which are not in any discernible order. Because of this, they have been an absolute nightmare to search.

The Redditor, nicko170, said they had a large language model transcribe, collate, and summarize the documents and built the database to make the files more easily searchable.

“It processes and tries to restore documents into a full document from the mixed pages - some have errored, but will capture them and come back to fix,” they wrote. “Not here to make a buck, just hoping to collate and sort through all these files in an efficient way for everyone.”

On the project’s GitHub, they further explain how it was built:

“This project automatically processes thousands of scanned document pages using AI-powered OCR to:

  • Extract and preserve all text (printed and handwritten)
  • Identify and index entities (people, organizations, locations, dates)
  • Reconstruct multi-page documents from individual scans
  • Provide a searchable web interface to explore the archive

This is a public service project. All documents are from public releases. This archive makes them more accessible and searchable.”

The database only features OCR’ed transcripts of the files and not images of the files, though it does tell users the filename so they can go and download the actual document themselves. Like essentially all OCR and LLM projects, there are some errors. Some of the transcripts are gibberish, presumably caused by blurry or illegible type and handwriting on the source documents. But the project represents a pretty good use of AI technology, because the source documents themselves are so messy and were released in such a terrible format that is extremely time consuming to go through them.

The database is indeed pretty usable; I was able to quickly find files that mention Donald Trump (which have already been widely reported on).

To be clear, there are no new files included in this tool, but for people who are looking to explore what has been released in a coherent, straightforward way, this is one of the better options out there. Besides releasing the database and the code for it on Github, they have also turned the entire project into a torrent file, meaning it cannot be easily deleted from the internet.




Holy Parachute out of Kirigami


Colorful parachutes at different levels of expansion

If you have a fear of heights and find yourself falling out of an airplane, you probably don’t want to look up to find your parachute full of holes. However, if the designer took inspiration from kirigami in the same way researchers have, you may be in better shape than you would think. This is because properly designed kirigami can function as a simple and effective parachute.

Kirigami, for those unfamiliar, is a cousin of origami where, instead of folding, you cut slits into paper. In this case, the paper effectively folds itself after being dropped, which allows the structure to create drag in ways similar to traditional parachute designs. Importantly, however, the stereotypical designs of parachutes have some more severe drawbacks than they appear. Some major issues include more obvious things, such as having to fold and unpack before and after dropping. What may be less obvious are the large eddies that traditional parachutes create or their ease at being disturbed by the surrounding wind.

The kirigami chutes fix these issues while being easier to manufacture and apply. While these are not likely to be quite as effective for human skydiving, more durable applications may benefit. Quoted applications, including drone delivery or disaster relief, worry more about accuracy and scalability rather than the fragile bones of its passenger.

Clever and simple designs are always fun to try to apply to your own projects, so if you want to have your own hand, make sure to check out the paper itself here. For those more interested in clever drone design to take inspiration from, look no further than this maple seed-inspired drone.

youtube.com/embed/6rrDW6YIbXI?…


hackaday.com/2025/10/09/holy-p…



A hack impacting Discord’s age verification process shows in stark terms the risk of tech companies collecting users’ ID documents. Now the hackers are posting peoples’ IDs and other sensitive information online.#News


The Discord Hack is Every User’s Worst Nightmare


A catastrophic breach has impacted Discord user data including selfies and identity documents uploaded as part of the app’s verification process, email addresses, phone numbers, approximately where the user lives, and much more.

The hack, carried out by a group that is attempting to extort Discord, shows in stark terms the risk of tech companies collecting users’ identity documents, and specifically in the context of verifying their age. Discord started asking users in the UK, for example, to upload a selfie with their ID as part of the country’s age verification law recently.

💡
Do you know anything else about this breach? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

“This is about to get really ugly,” the hackers wrote in a Telegram channel, which 404 Media joined, while posting user data on Wednesday. A source with knowledge of the breach confirmed to 404 Media that the data is legitimate. 404 Media granted the source anonymity to speak candidly about a sensitive incident.

This post is for subscribers only


Become a member to get access to all content
Subscribe now


#News

Breaking News Channel reshared this.