Salta al contenuto principale



#GiochiDellaGioventù, dalle 18 allo stadio Olimpico di Roma la cerimonia di premiazione. Parteciperanno il Ministro dell’Istruzione e del Merito Giuseppe Valditara, il Ministro per lo Sport e i Giovani Andrea Abodi e il Presidente di Sport e Salute, …


The Surf app goes even deeper on building custom feeds for the fediverse and Bluesky, , a crowdfunding campaign for the PeerTube mobile app, and updates to the bridge between the fediverse and Bluesky.


Fediverse Report – #118

The Surf app goes even deeper on building custom feeds for the fediverse and Bluesky, , a crowdfunding campaign for the PeerTube mobile app, and updates to the bridge between the fediverse and Bluesky.

I also run a weekly newsletter, where you get all the articles I published this week directly in your inbox, as well as additional analysis. You can sign up right here, and get the next edition this Friday!

The News


Surf is a new app by Flipboard, that describes itself as a browser for the open social web. The app allows people to build and browse custom feeds, that take in content from across the open social web. It can combine Mastodon posts with Bluesky posts, as well as RSS and more, into a single feed. With their most recent update, Surf has created Starter Sets for building custom feeds. Starter Sets are organised around various popular themes, like News, Tech or Sports. Within these themes, people can choose from a large variety of data sources to get started with building their own custom feeds. These custom feed sources can be from across the open social web and are modular. This means that a list of Mastodon accounts can be combined with a Bluesky custom feed to create a new single custom feed that consists of both data source. These custom feeds can also be published to Bluesky, so people who are not using the Surf app can also view these feeds.

Surf also now offers a variety of tools to manage the content of a custom feed. For example, a feed can be customised to include or exclude reposts, replies or adult content. There are also options to filter out posts about politics from the feed. The ability to filter about posts about Elon Musk is surely a popular feature as well. Surf categorises all posts via algorithmic clustering, which gives the ability to limit posts in a feed to a certain topic. This means that you can add an account to a feed, but only their posts related to the specified topic will be displayed. The app is currently in closed beta, and Flipboard is gradually onboarding more people from the waiting list.

PeerTube is starting a crowdfunding campaign for its mobile app. The first version of the PeerTube app was officially launched earlier this month. PeerTube is developed by Framasoft, a French non-profit organisation that builds a variety of open source software tools. The crowdfunding campaign is a way to raise money for the organisation, and also provides a way “to gauge public enthusiasm for the mobile application and the PeerTube project in general”. Some of the features that PeerTube wants to work on for its app are the ability to play videos in background, casting videos to TVs, managing channels and accounts directly from the app. Livestreaming from mobile is also being worked on, although Framasoft says they do not expect to release this in 2025. Framasoft says that these features will be worked on regardless of whether the fundraising goals are met, and that otherwise money from the generic Framasoft budget will be used, as a way to show their dedication towards PeerTube.

Mastodon has announced some upcoming new features that help server admins with the legal side. Server admins will be able to set a Terms of Service (ToS), besides server rules and a privacy policy. Server admins will also be able to set the server rules into multiple different languages. There will also be the option to set a minimum age requirement for sign-up for servers. Having a ToS is standard fare for any online platform, and multiple countries require by law that platforms have these. Europe’s DSA is fairly explicit about this, which states: “Providers of intermediary services shall include information on any restrictions that they impose in relation to the use of their service in respect of information provided by the recipients of the service, in their terms and conditions.” In that context, it is high time that Mastodon has added the ability for servers to set a ToS. Mastodon also says that they will provide a template for a ToS that other servers can use if they so desire.

A New Social, the organisation behind Bridgy Fed, has launched a dedicated page for people to manage their account bridging. Bridgy Fed is a piece of software that allows people to ‘bridge’ their account across multiple protocols. This allows people on the fediverse to interact with people on Bluesky (using AT Protocol). For this, people need to manually opt-in their accounts to be bridged to other networks (largely due to cultural reasons from the fediverse communities). Up until now, doing so was a fairly confusing process that involved manually following other accounts. With the new update, people can log in to Bridgy Fed with the account they want to bridge, and simply turn it on or off. It also has an easier option to update the handles for Mastodon accounts that are bridged to Bluesky. For example, by default my Mastodon account on Bluesky can be found at @[url=did:plc:43qcmg2xbxakj6mp4puqyayv]Laurens Hof[/url], which is a fairly cumbersome handle, to put it mildly. At the settings page I can now change it to any handle I want, similar to how any Bluesky account can change their handle. A New Social is also launching a Patreon as they are working towards financial sustainability, with plans to launch merch soon as well.

Ibis is a federated wiki platform that is currently in development, made by nutomic, one of the Lemmy creators. With the most recent update, Ibis wiki articles are now compatible with Lemmy, and can be viewed directly from Lemmy. One of the driving reasons for making Ibis is that nutomic views Wikipedia as untrustworthy. He also says that other centralised Wikipedia alternatives have failed to gain traction, and sees federation as a solution for this. For now, Ibis has the same problem of getting traction.

Tvmarks is a new self-hosted platform to keep track of shows you’ve watched. It gives you a clean overview of shows you are watching, which ones you’ve completed, and provide reviews and ratings per episode. This information can be federated via ActivityPub, allowing others to see what you’ve been watching.

The Links


That’s all for this week, thanks for reading! You can subscribe to my newsletter to get all my weekly updates via email, which gets you some interesting extra analysis as a bonus, that is not posted here on the website. You can subscribe below:

#fediverse

fediversereport.com/fediverse-…




Caricabatterie 3x USB 30W Green Cell ChargeSource3 NUOVO - Questo è un post automatico da FediMercatino.it

Prezzo: 15 $

Vendo caricatore GC Charge Source 3 (comprato a 20€) con 3 porte USB veloci e potenza totale di 30W. Compatibile con qualsiasi dispositivo dotato di porta USB.

  • 🇪🇺 Marchio europeo: ottima alternativa ad Anker
  • 🆕 Nuovissimo, scatola ancora sigillata
  • 🔋 Ricarica rapida: QC 2.0 / 3.0, GC Ultra Charge, Samsung AFC, Huawei FCP / SCP
  • 🔌 30W di potenza totale
  • ⚡️ 1 porta USB-A Ultra Charge - ricarica fino a 3,5 volte più velocemente (compatibile con iPhone SE (2020)/XS/X/XR/11/12/13, Samsung Galaxy S20/S10/S10+/S10e, ecc.)
  • ⚡️⚡️ 2 porte USB-A Smart - regolano automaticamente la velocità di ricarica ottimale per ogni dispositivo

👉 Scheda prodotto sul sito ufficiale

Price: 15 $ :: Questo è un articolo disponibile su FediMercatino.it

Si prega di rispondere con un messaggio diretto/privato al promotore dell'annuncio.

Per informazioni su: Fedimercatino: Chi siamo

Seguici su @ e sul gruppo @

🔗 Link su FediMercatino.it per rispondere all'annuncio

@Il Mercatino del Fediverso 💵♻️



Reconditioning a Vintage CRT Tube


Plenty of readers will be familiar with CRT televisions, not least because many of us use them with retrocomputers and consoles. But perhaps fewer will have worked with CRTs themselves as components, and of those, fewer still will be familiar with the earlier generation of tubes. In the first few decades of color TV the tubes were so-called delta gun because their three electron guns were arranged in a triangular form. [Colorvac] has put up a video in which they demonstrate the reconditioning of one of these tubes from a late-1960s Nordmende TV.

The tube in question isn’t one of the earlier “roundies” you would find on an American color TV from the ’50s or early ’60s, instead it’s one of the first generation of rectangular (ish) screens. It’s got an under-performing blue gun, so they’re replacing the electron gun assembly. Cutting the neck of the tube, bonding a new neck extension, and sealing in a new gun assembly is not for the faint-hearted, and it’s clear they have both the specialist machinery and the experience required for the job. Finally we see the reconditioned tube put back into the chassis, and are treated to a demonstration of converging the three beams.

For those of us who cut our teeth on these devices, it’s fascinating.

youtube.com/embed/p3rfWWCsUaA?…


hackaday.com/2025/05/27/recond…

Arun Shah™ reshared this.



Ecco cosa prevede il pacchetto da 150 miliardi per la difesa europea. Tutti i dettagli

@Notizie dall'Italia e dal mondo

Il Consiglio europeo ha approvato oggi il pacchetto Safe (Support for ammunition and armaments production framework), aprendo ufficialmente la strada a uno dei più ambiziosi programmi di finanziamento per la difesa nella storia dell’Unione. Con un valore complessivo di 150



Safe, uno strumento macchinoso ma con il potenziale per una svolta europea. La lettura di Braghini

@Notizie dall'Italia e dal mondo

Il Consiglio dell’Unione europea ha adottato oggi il regolamento Security Action For Europe (Safe) con una controversa procedura di urgenza, utilizzando l’art.122 del Trattato che esclude il Parlamento Europeo, il quale



La Nato chiama e l’Italia risponde. Raddoppiata la produzione di missili

@Notizie dall'Italia e dal mondo

L’Italia raddoppierà la produzione dei suoi missili SampT, in un piano che vedrà protagonista Mbda per un aumento produttivo del 40% per il primo anno ed un incremento del 100% nel secondo anno. Lo ha annunciato ufficialmente il ministro della Difesa Guido Crosetto, precisando che le prime



Siria e Israele negoziano in segreto di relazioni di sicurezza


@Notizie dall'Italia e dal mondo
La trattativa ormai diretta, di cui riferisce l'agenzia Reuters, sta facendo passi importanti in avanti verso la normalizzazione dei rapporti. Lo indica anche l'improvvisa interruzione degli attacchi aerei israeliani in Siria
L'articolo Siria e Israele negoziano in segreto di



ViciousTrap: la botnet che ha infettato oltre 5.000 router in 84 Paesi


Gli analisti di Sekoia hanno scoperto che il gruppo di hacker ViciousTrap ha compromesso circa 5.300 dispositivi di rete edge in 84 paesi, trasformandoli in una botnet simile a un grande honeypot.

Gli aggressori hanno sfruttato una vecchia vulnerabilità critica, lil CVE-2023-20118, per hackerare i router Cisco Small Business RV016, RV042, RV042G, RV082, RV320 e RV325. Si nota che la maggior parte dei dispositivi compromessi (850) si trovano a Macao.

“La catena di infezione consiste nell’esecuzione di uno script shell chiamato NetGhost, che reindirizza il traffico in arrivo da porte specifiche su un router compromesso verso un’infrastruttura simile a un honeypot controllata dagli aggressori, consentendo loro di intercettare le connessioni di rete”, affermano gli esperti.

In precedenza, lo sfruttamento del problema CVE-2023-20118 era stato attribuito a un’altra botnet denominata PolarEdge e ora si ritiene che le due campagne malware possano essere correlate. Gli esperti ritengono che gli aggressori dietro ViciousTrap stiano probabilmente costruendo un’infrastruttura honeypot hackerando un’ampia gamma di dispositivi, tra cui router domestici, VPN SSL, DVR e controller BMC di oltre 50 marchi, tra cui Araknis Networks, Asus, D-Link, Linksys e Qnap.

“Questo schema consente agli aggressori di osservare i tentativi di sfruttamento in diversi ambienti, raccogliere exploit non pubblici e zero-day e riutilizzare l’accesso ottenuto da altri hacker”, spiega l’azienda. Secondo i ricercatori, tutti i tentativi di sfruttamento rilevati provenivano da un singolo indirizzo IP (101.99.91[.]151), con l’attività più antica risalente a marzo 2025. In particolare, un mese dopo, i partecipanti a ViciousTrap hanno utilizzato per le loro operazioni una web shell non documentata, precedentemente impiegata negli attacchi PolarEdge.

Anche all’inizio di questo mese sono stati osservati attacchi simili sui router Asus, ma da un indirizzo IP diverso (101.99.91[.]239), anche se in questo caso gli aggressori non hanno creato honeypot sui dispositivi infetti.

Tutti gli indirizzi IP associati a questa campagna si trovano in Malesia e fanno parte di AS45839, gestito dal provider di hosting Shinjiru. Si ritiene che il gruppo responsabile degli attacchi sia di origine cinese, poiché la sua infrastruttura si sovrappone leggermente a quella di GobRATe il traffico viene reindirizzato verso più siti a Taiwan e negli Stati Uniti. “Lo scopo ultimo di ViciousTrap resta poco chiaro, ma siamo fermamente convinti che si tratti di una rete di ricognizione honeypot”, concludono i ricercatori.

L'articolo ViciousTrap: la botnet che ha infettato oltre 5.000 router in 84 Paesi proviene da il blog della sicurezza informatica.



Citing pressure from payment processors and new legislation, a critical resource for producing nonconsensual content bans AI models depicting the likeness of real people.#News
#News


Oltre 60 funzionari USA spiati: la clamorosa fuga di dati da TeleMessage


Lo scandalo che circonda la fuga di dati di TeleMessage continua ad aumentare. Come rivelato di recentemente , degli hacker hanno avuto accesso a un archivio di corrispondenza che coinvolge oltre 60 dipendenti del governo degli Stati Uniti, tra cui rappresentanti della Casa Bianca, dei servizi segreti, di missioni diplomatiche, della dogana e dei servizi di risposta alle emergenze.

Tutti i messaggi sono stati pubblicati sulla piattaforma Distributed Denial of Secrets, un progetto specializzato nell’archiviazione di fughe di notizie ricevute nell’interesse pubblico.

Stiamo parlando di una corrispondenza frammentaria che copre circa un giorno: il 4 maggio. I dati intercettati includevano messaggi riguardanti la logistica di una visita di funzionari statunitensi in Vaticano e Giordania, nonché comunicazioni interne della Federal Emergency Management Agency.

Alcuni destinatari hanno confermato l’autenticità dei messaggi intercettati, tra cui un denunciante della FEMA e una società finanziaria. I telefoni di più di una mezza dozzina di funzionari corrispondevano effettivamente a quelli dei loro proprietari.

TeleMessage è finita sotto i riflettori dopo che un fotografo della Reuters ha immortalato l’ex Consigliere per la Sicurezza Nazionale Mike Waltz mentre utilizzava l’app durante una riunione di Gabinetto il 30 aprile. L’incidente ha sollevato interrogativi sul livello di sicurezza digitale all’interno dell’amministrazione Trump.

Waltz si è già trovato al centro di una controversia dopo aver aggiunto un giornalista a un gruppo Signal che discuteva di attacchi militari nello Yemen. Questo fu uno dei motivi delle sue dimissioni, ma Trump lo nominò subito ambasciatore degli Stati Uniti all’ONU.

Il servizio TeleMessage è una versione del popolare servizio di messaggistica adattata ai funzionari governativi, con la possibilità di archiviare i messaggi in conformità con le normative governative. È stato chiuso il 5 maggio, ufficialmente come “misura precauzionale”. Il suo proprietario, Smarsh, con sede a Portland, non ha rilasciato dichiarazioni in merito alla fuga di notizie.

I servizi segreti hanno affermato che il servizio è stato utilizzato solo da un gruppo limitato di dipendenti e che è in corso un’indagine interna. La FEMA ha affermato di non avere prove che le sue informazioni siano state compromesse, mentre i funzionari della CBP e del Dipartimento di Stato hanno rifiutato di rilasciare dichiarazioni.

Un’analisi dei contratti federali ha scoperto che TeleMessage è stato utilizzato anche dal Dipartimento della Sicurezza Interna e dai Centri per il Controllo e la Prevenzione delle Malattie (CDC). Questi ultimi hanno ammesso di aver testato la piattaforma nel 2024, ma di averla abbandonata. Una settimana dopo l’attacco informatico, la Cyber ​​Defense Agency (CISA) ha consigliato a tutti gli utenti di smettere di usare TeleMessage finché non avessero ricevuto istruzioni ufficiali da Smarsh.

Sebbene i messaggi trapelati non contenessero dati particolarmente sensibili, l’ex specialista della NSA Jake Williams ha affermato che i metadati stessi (chi ha comunicato con chi e quando) rappresentano una risorsa di intelligence importante e potrebbero essere utilizzati a fini di controspionaggio.

L'articolo Oltre 60 funzionari USA spiati: la clamorosa fuga di dati da TeleMessage proviene da il blog della sicurezza informatica.





Hands-On: eufyMake E1 UV Printer


The modern hacker and maker has a truly incredible arsenal of tools at their disposal. High-tech tools like 3D printers, laser cutters, and CNC routers have all become commonplace, and combined with old standbys like the drill press and mini lathe, it sometimes seems like we’ve finally peaked in terms of what the individual is realistically capable of producing in their own home. But occasionally a new tool comes along, and it makes us realize that there are still avenues unexplored for the home gamer.

After spending the last few weeks playing with it, I can confidently say the eufyMake E1 UV printer is one of those tools. The elevator pitch is simple: with a UV printer, you can print anything on anything. As you can imagine, the reality is somewhat more complex, but the fact that you can toss a three dimensional object in the chamber and spray it with a high-resolution color image with a few button presses holds incredible creative potential. Enough that the Kickstarter for the $1,700 printer has already raised a mind-boggling $27 million at the time of this writing, with more than a month yet to go before crossing the finish line.

If you’re on the fence about backing the campaign, or just have doubts about whether or not the machine can do what eufyMake claims, I’ll put those concerns to rest right now — it’s the real deal. Even after using the machine for as long as I have, each time a print job ends, I find myself momentary taken aback by just how good the end result is. The technology inside this machine that not only makes these results possible, but makes them so easily obtainable, is truly revolutionary.

That being said, it’s not a perfect machine by any stretch of the imagination. While I never ran into an outright failure while using the eufyMake E1, there’s a fairly long list of issues which I’d like to see addressed. Some of them are simple tweaks which may well get sorted out before the product starts shipping this summer, while others are fundamental to the way the machine operates and could represent an opportunity for competitors.

Theory of Operation


Before we go any further, I think it’s important to explain how the eufyMake E1 works. Not only because UV printers aren’t the kind of thing that most of us have had first-hand experience with, but because I want readers to understand how much the product gets right.

In the most basic case, you’ll open up the door of the E1, and stick an object on the bed. (There’s a larger bed that you can swap in for over-sized objects, but you have to run the printer with the doors open.) That’s a literal “stick”, by the way, as the bed is designed to be tacky to provide a bit of hold on smaller objects which might otherwise jump around as the machine moves. The E1 will then go through an automated process that includes flashing lights and sweeping red laser beams. This provides the machine with a 3D scan of the object on the bed, which is necessary for positioning the print head later on.

At this point, the software (available for Windows, Mac, and mobile devices) will present the user with a “bird’s eye view” of the bed and any objects on it. From here you can either use the basic art tools in the software, or more likely, import some artwork created in a more comprehensive piece of software. In either event, the process is the same, in that you virtually apply your artwork directly on the overhead image. Once you’re happy with how it looks, you hit “Print”, pick a few options relating to the target’s surface material and the print quality, and off it goes.

Printing is admittedly slower than I had expected. Depending on the image complexity, even a palm-sized job could take 20 or 30 minutes. While I never pushed it so far personally, I’ve heard from other testers that larger projects can take hours to complete. In that way, it’s a lot like a 3D printer — you aren’t the one that has to do all that work, so who cares if the process takes an hour or two, just let it run and come back to it later. In my experience, the results have always been more than worth the wait.

Practical Examples


I’ve said as much previously, but we don’t take reviews and hands-on articles like this lightly here at Hackaday. Companies offer to send us hardware on an almost daily basis, but we turn down the vast majority of them as we just don’t think they’re a great fit for our audience. Is the average Hackaday reader really going to be interested in a review of yet another 3D printer or laser engraver? Probably not.

So before we agreed to take a look at the eufyMake E1, Elliot and I talked a bit about how such a machine would be used in our community specifically. We came up with a few things we thought hardware hackers would want to do with this kind of capability, and I made sure to focus on those applications over the more “crafty” demonstrations that you may have seen elsewhere.

Full-Color PCB Art


While we’re starting to see board fabs support color silkscreens, it’s not a capability that’s necessarily ready for prime time. Beyond the mixed results we’ve heard from those in the community in terms of the quality of the resulting boards, there’s some unfortunate software/vendor lock-in that we’d just as soon avoid. So what if you could skip all that and simply put your professionally made PCBs in the E1 and have it apply your artwork to them?

In this fairly simple example I’ve taken one of the spare boards from my Soma FM badge and applied a few high resolution images onto it. I never really had any doubt that the eufyMake E1 could do PCB art, but still, it was extremely satisfying to see it in person.

Control Panels


High quality control panels have always been tricky to produce at home. Sure there’s ways to pull it off, such as the recent trick we covered that used specially treated inkjet printouts, but they tend to be time consuming and the results are highly dependent on the material you’re working working. With the UV printer, front panels are a breeze and you’ll get consistent results whether you’re working with plastic or metal.

For this example I came up with a flight-sim style panel inspired by various fighter jets. The workflow was actually quite nice: I designed the panel itself in OpenSCAD, and then exported it as both a 3D STL and 2D DXF file. The 3D file got printed out, and the 2D file was imported into Inkscape. With a 1:1 outline of the panel in Inkscape, I could position the text and images knowing they would line up perfectly with the real-world object. I exported my Inkscape design as an SVG, loaded it into the E1’s software, and applied it to the printed panel.

Truly Custom Keycaps


We’ve seen incredible interest in bespoke keyboards over the last few years, and customized keycaps are a big part of that. But even the most decked out keyboards are generally still using off-the-shelf keycaps. But why settle for that when you can buy blank caps and apply whatever text or artwork you wish on them?

These are such a perfect application for the E1 that I imagine it’s going to ignite something of a custom keycap revolution once the printer gets into consumer’s hands. Whether you want each key to be the face of a different anime character, or want all the legends to be in Comic Sans, you have complete control. They also serve as a great example of the fine detail work that’s possible on the machine.

The Perfect PCB Machine?


I know what you’re thinking: “Stop teasing me, can the damn thing make PCBs or not!” The short answer is yes…but the long answer is worth a bit more examination.

The UV print seems to work very well as an etch resist, as it was completely unfazed by its encounter with ferric chloride. In fact, the first challenge was figuring out how to get the stuff off after etching. Alcohol, turpentine, and paint thinner did nothing to it. Eventually I found that soaking the board in acetone will break down the bond between the printed layer and the copper — you still need to peel it off, but once you get under an edge with a razor blade it parts without too much trouble.

Early results look promising. The lines aren’t as clean as I’d like, so it will probably have problems with tight pitch parts, but the traces were intact down to 0.2 mm, and the pads for the SOIC8 footprint I picked as a test were properly isolated from each other. At this point, it’s a working PCB that’s at least as good as something made with the old school toner transfer method. But the E1 promises so much more.

Putting the board back in the machine, I was able to spray it with additional layers that act as both a soldermask and silkscreen. While I want to experiment a bit more and refine the techniques involved, even this first attempt produced a remarkably professional looking board with very little manual effort on the user’s part.

That said, while this proof of concept shows it’s clearly possible to produce impressive boards on the machine, the process is made frustrating by various limitations of the hardware and software.

One-Off Versus Production


Let’s be clear, as a product, the eufyMake E1 is designed to let crafty folks put pictures of their kids on slate coasters and emblazon mugs with the logo of their favorite sports team. The software and hardware is clearly designed to make it as easy as possible to toss an object into the printer, get your image virtually aligned on it, and then spray it on. At this, the product excels, and I have no doubt it will be a commercial success.

But while hardware hackers are certainly not immune to the charms of putting memes and logos on their possessions, we also have slightly higher demands. If we’re talking about using it for producing PCBs, or even just adding art to existing boards, we’re looking for high positional accuracy and repeatability.

To that end, I have to report that the E1 is not particularly well suited to such technical tasks. It can be pushed into service, but there’s several aspects of the product that would really need to be addressed before this could be a workhorse for the hackerspace.

Lack of Physical Indexing


As it stands, the bed on the eufyMake E1 is a completely flat surface, with no provisions for work holding or indexing. You’re expected to visually align your print each time — workable for one or two copies of an object, but excruciating beyond that.

Now you might be thinking that this is an easy enough problem to remedy…but you’re probably forgetting that 3D bed scan. Any fixture you come up with to hold your object in position runs the risk of screwing up the scan and causing the print to abort. Even trying to tape a PCB down with blue painter’s tape would occasionally trigger an error during the scan as the machine couldn’t find a clearly defined edge.

As you’ll see below, I’ve had some success with very thin 3D printed fixtures that avoid the ire of the scanner. Long term, I’d like to see an alternate bed that resembled a CNC fixture plate, so that multiple parts can be held in position with low-profile pegs.

The Parallax View


At the suggestion of Thomas Flummer, I printed out a few thin (1.2 mm) jigs that could be taped down to the bed and help position multiple objects for batch processing. This is much better than having to eyeball things each time, but it uncovered a new issue.

For objects in the center of the bed, the optical alignment system works pretty well. It should get you within a millimeter or so on the first attempt, but it’s way off on the edges of the bed. Take a look at the following example: the in the software, both blue rectangles were perfectly aligned within the footprint of the 1206 LED:

As you can see the alignment on the board in the center is pretty locked in, but on the other board, it’s halfway out of the footprint. This might be close enough if you’re making grandma some Christmas ornaments, but it won’t cut it for SMD work.

The good news is that you can go back into the software and move objects at the sub-millimeter level by typing in the desired coordinates. This will cause the visual representation to become misaligned, but so long as you know where the target is in the real-world, it doesn’t matter. So if you can afford a bit of trial-and-error, it’s possible to get the alignment dialed in even across multiple objects on the bed.

The Shape of Things to Come?


As I said at the start, the eufyMake E1 is not a perfect machine. Beyond the major issues I’ve outlined here, there’s all sorts of weird quirks and limitations I’ve run into during my time with it. For example, why don’t the lights inside the enclosure turn on when the door is open? Why doesn’t the printer itself have a small screen to display status information? We won’t even get into the fact that all your interactions with the printer have to go through the cloud — there isn’t even so much as a USB port on the printer to allow local control.

But at the end of the day, I’m still extremely excited about this machine. The fact is, there’s really nothing else quite like it on the market, at least, not at this price anyway. It reminds me a bit of the MakerBot Cupcake 3D printer, or even the K40 laser. It represents such a huge leap forward in capability for the individual that it’s easy to excuse the rough edges.

Like those machines, I believe the eufyMake E1 will set many of the standards for the products that come after it. You may never own this particular UV printer, but I’m willing to bet that after a few hardware generations, when the cost of the technology is driven even lower thanks to increased competition, the printer that you do buy will be able to trace its lineage back to this moment.



Relazione della Direzione Investigativa Antimafia sull'attività svolta e i risultati conseguiti nel primo e secondo semestre 2024



La relazione è stata pubblicata il 27 maggio 2025 (è reperibile a questa pagina web direzioneinvestigativaantimafi…) e presentata dal Ministro dell’Interno al Parlamento. Analizza i fenomeni di criminalità organizzata di stampo mafioso.
A differenza delle edizioni passate il documento:

  • offre un'analisi più ravvicinata nel tempo, coprendo l'intero anno 2024 per garantire un quadro più aggiornato,
  • è stato snellito e organizzato attorno alle diverse matrici mafiose, descrivendo la loro operatività a livello territoriale e le strategie di contrasto adottate,
  • offre una migliore visualizzazione delle dinamiche criminali per rendere le informazioni più immediate e comprensibili.

Aggiornamenti sulle interdittive antimafia: La relazione dedica particolare attenzione ai provvedimenti delle Prefetture e ai nuovi strumenti giuridici volti a reintegrare le aziende colpite dalla criminalità organizzata nel circuito economico legale.
La dimensione internazionale

Nella relazione 2024 della Direzione Investigativa Antimafia emerge chiaramente come le attività non si siano limitate al solo ambito nazionale, ma abbiano avuto anche una forte dimensione internazionale. In particolare, il documento elenca operazioni condotte sia a livello europeo che internazionale, dimostrando un coordinamento con le autorità di altri paesi e con organismi internazionali. Questo approccio diventa fondamentale per combattere forme di infiltrazione mafiosa che travalicano i confini nazionali e si manifestano in settori strategici, dove il confine tra attività lecite e illecite diventa sempre più labile.
Un esempio evidente riguarda il settore del gioco e delle scommesse online: la relazione evidenzia che, oltre agli interventi a livello locale, sono state realizzate operazioni specifiche che hanno avuto un focus sul mercato americano, riconosciuto come un'area particolarmente vulnerabile alle infiltrazioni e al riciclaggio di denaro. Queste iniziative internazionali prevedono uno scambio costante di informazioni, tecniche investigative e strumenti operativi con partner stranieri, al fine di interrompere le reti criminali e prevenire il consolidamento di rapporti economici illeciti che possano favorire l'espansione delle organizzazioni mafiose.

L'approccio internazionale, dunque, non solo amplia il raggio d'azione della DIA, ma rafforza anche l'efficacia delle misure adottate sul territorio nazionale. La cooperazione transnazionale permette di intercettare flussi finanziari sospetti, monitorare attività economiche a rischio e sviluppare strategie congiunte che rispondano in tempo reale a fenomeni complessi e in rapido mutamento. Queste iniziative sottolineano l'importanza di una risposta globale alla criminalità organizzata, in un contesto in cui i mercati economici e tecnologici rendono il contrasto al crimine organizzato una sfida sempre più articolata.

Vale la pena notare come la Direzione Investigativa Antimafia, oltre a intervenire sul territorio nazionale, stia sviluppando un robusto sistema di cooperazione transnazionale, anche quale leader della rete anti-mafia internazionale @ON. Questo approccio prevede:

  • Operazioni congiunte: La collaborazione con le autorità di altri paesi consente lo scambio tempestivo di informazioni e dati investigativi, fondamentale per intercettare e smantellare reti criminali che operano al di là dei confini nazionali.
  • Focus su settori sensibili: Alcuni interventi sono rivolti a mercati particolarmente vulnerabili, quali il gioco d'azzardo e le scommesse online, dove il riciclaggio di denaro si inserisce in circuiti internazionali complessi.
  • Tecnologie e metodologie condivise: L’impiego di strumenti avanzati per la raccolta e l’analisi dei dati permette alle autorità di monitorare in tempo reale flussi finanziari sospetti, integrando così le informazioni provenienti da svariate giurisdizioni.
  • Integrazione giuridica: Nuovi istituti e interventi normativi favoriscono non solo il contrasto diretto alle infiltrazioni mafiose, ma anche il reinserimento delle aziende “contaminate” nel circuito economico legale, garantendo un bilanciamento tra rigore nell’applicazione della legge e rispetto delle dinamiche di mercato.

Questi aspetti, sviluppati a livello internazionale, mostrano come l’evoluzione delle tecniche investigative e delle collaborazioni transfrontaliere stia diventando cruciale per contenere fenomeni criminali sempre più sofisticati e globalizzati.

#DIA #direzioneinvestigativaantimafia #relazione2024

@Notizie dall'Italia e dal mondo



Flock's automatic license plate reader (ALPR) cameras are in more than 5,000 communities around the U.S. Local police are doing lookups in the nationwide system for ICE.

Flockx27;s automatic license plate reader (ALPR) cameras are in more than 5,000 communities around the U.S. Local police are doing lookups in the nationwide system for ICE.#News #ICE #Surveillance #Flock



Il 28 maggio alle ore 10.30 presso la Sala Aldo Moro il #MIM, in collaborazione con l’INVALSI, ospiterà il seminario dal titolo "Il miglioramento dell’offerta formativa: le sfide per il sistema scolastico nell’epoca della transizione tecnologica e de…
#MIM


Schengener Informationssystem: Jeden Tag 41 Millionen Fahndungsabfragen in Europa


netzpolitik.org/2025/schengene…

ʙwɑnɑ нoɴoʟʊʟʊ reshared this.



In memoria di John Young e Cryptome


Siamo onorati di pubblicare questo contributo, scritto da Jaromil, per ricordare il co-fondatore del leggendario archivio internet Cryptome, morto all’età di 89 anni il 28 marzo scorso. John Young è morto. Aveva ottantanove anni. La sua opera con Cryptome è eminente per molti di coloro che furono attivi agli albori delle reti digitali. Young assieme a sua moglie Deborah Natsios fu il…

Source



ePA ohne Selbstbestimmung: Befunde sollen für alle Praxen sichtbar bleiben


netzpolitik.org/2025/epa-ohne-…

reshared this



Storia del Regno di Diarra: Origini e Sviluppi

@Arte e Cultura

Introduzione Il Regno di Diarra, noto anche con i nomi di Kingui, Diafunu o Kaniaga, fu un antico stato dell’Africa occidentale situato nell’odierno Mali nord-occidentale. Fondato nell’XI secolo d.C. dalle popolazioni soninké,

Arte e Cultura reshared this.



Il Consiglio Ue ha dato il via libera al maxi piano SAFE da 150 miliardi per finanziare il riarmo in Europa


@Politica interna, europea e internazionale
L’Unione europea ha compiuto oggi un ulteriore passo avanti verso il riarmo del continente con il via libera definitivo da parte del Consiglio Ue al nuovo fondo Security Action for Europe (SAFE) da 150 miliardi di euro, volto a finanziare gli



Black Inside Festival Jazz la seconda edizione a Lonate Ceppino (Va)
freezonemagazine.com/news/blac…
Lonate Ceppino (Va) ospita la seconda edizione del BLACK INSIDE FESTIVAL JAZZ Il 30 e 31 maggio 2025 – Musica, passione e collaborazioni del territorio Dopo il successo della prima edizione, torna a Lonate Ceppino (VA) il Black Inside Festival Jazz, due giornate interamente dedicate alla grande musica dal vivo, con la


Predatory states


#LatinAmerica #history #counterinsugensy #cupdetat #CondorOp #coldwar #70s #80s

Preface

I WAS A VICTIM OF OPERATION CONDOR and the one who discovered its secret archives in Asunción, Paraguay, in December 1992.
During the night of November 29, 1974, I was abducted by the political police of the dictator Afredo Stroessner and taken directly before a military tribunal in Paraguay made up of the military attachés of Argentina, Brazil, Bolivia, Chile, and Uruguay, also with the presence of Paraguayan civil and military authorities.
A Chilean officer questioned me about my supposed link with Chilean university people because I had taken a course in the sociology of education at Catholic University. The police chief of the province of Córdoba, Argentina, wanted to know of my links to the “subversives” of the University of La Plata, where I had graduated with a doctorate in the science of education.
The interrogation lasted thirty days, with terrible tortures. Finally, they categorized my crime as “intellectual terrorism”: for the so-called subversive content of my doctoral thesis; for having promoted the campaign “A Roof of Your Own” for each Paraguayan educator in my capacity as a unionist fighting in the national teachers association; and for having put into practice the methods of Paulo Freire’s Pedagogy of the Oppressed in the Juan B. Alberdi Institute, where I was director.
My wife, the educator Celestina Pérez, died as a consequence of the psychological tortures to which she was subjected, being forced to listen on the telephone, systematically for ten days, to my cries and screams from the torture chamber. On the tenth day, at midnight, she received a call announcing my death, with someone asking her “to come to retrieve the cadaver of the subversive educator.” The call provoked a heart attack, and she died of pain.
I was transferred among various police stations for “bad conduct,” eventually ending up at the concentration camp called Emboscada. In Police Station No. 1, the headquarters of INTERPOL, I learned of the existence of Operation Condor for the first time, seven months before the intelligence conference promoted by the Chileans Augusto Pinochet and Manuel Contreras in Santiago in November 1975. My informant was a police officer who was imprisoned with us for not having denounced his son, also a student at the University of La Plata, who had been a member of the rebellious Centro de Estudiantes (Student Center). This policeman became aware of Plan Condor because he worked in the telecommunications office of the police.
In my prison in Police Station No. 3, “Tomb of the Living,” I shared a cell with the Argentine Amilcar Latino Santucho, who told me that he and Jorge Fuentes Alarcón, a Chilean leader of MIR (Movimiento de la Izquierda Revolucionaria, Movement of the Revolutionary Left of Chile) also had been taken before a military tribunal composed of military attachés of the Southern Cone countries of South America.
In September 1976, I was transferred to the concentration camp Emboscada, where I met the Paraguayan doctor Gladys M. De Sannemann, who told me that she was a victim of Operation Condor. She was abducted by the Paraguayan police in Argentine territory, in Misiones, Posadas.
After completing three years of prison I began a hunger strike, which lasted for thirty days, and thanks to the urgent action campaign by Amnesty International, I recovered my freedom in September 1977.
I went into exile in Panama. There, the United Nations Educational, Scientific, and Cultural Organization (UNESCO) in Paris, contracted me to be a consultant of UNESCO for Latin America, a position I held from 1978 to 1992.
For almost fifteen years, I carried out an investigative project on Operation Condor, based on the testimonies of my prison companions and on the Revista Policial Paraguaya (Paraguayan Police Magazine).
For these reasons, I value the research investigation on Operation Condor, Predatory States, realized by J. Patrice McSherry. She presents the U.S. and Latin American scenario in which this criminal pact developed and shows us how the Southern Cone countries were strongly politicized, with the rise of social mobilization after the triumph of the Cuban revolution. Professor McSherry also portrays the energetic response of the United States via the Pentagon, the CIA, and other security agencies, especially under the charge of National Security Advisor and Secretary of State Henry Kissinger in the 1970s. “No more Cubas” was the official policy underlying Washington’s unconditional support for the military coup against the constitutional government of Salvador Allende in Chile on September 11, 1973.
This book is a serious historical work with abundant documentation.
Professor McSherry shows us the dynamics of Operation Condor, with the interchange of intelligence information among the member states, the targeting of the “subversive” or “terrorist” element, and the torture, execution, or transfer of the subversives to any other signatory country. She also sheds light on the consequences of U.S. military intervention in the region: the era of state terrorism; the reduction of spaces for democratic participation; the physical elimination of militants and leaders of revolutionary movements; the control of civil society; and the disarticulation of political society.
Using documents declassified by the U.S. State Department, the author points out that U.S. officials regarded Operation Condor as a legitimate counterinsurgency organization. She shows that the state terrorists of Condor counted on Washington for technical assistance in torture, for financing, and even for a system of telecommunications.
Thanks to this important work of historical investigation, we learn of the magnitude of the violations of human rights committed in this epoch against Latin American societies that had aspirations for freedom. Another important element of Professor McSherry’s analysis is the contribution of French military officers, based on their counter-revolutionary experience in Algeria as well as Vietnam, to the training of U.S. soldiers in torture and other grave violations of human rights. This occurred under the administration of President John F. Kennedy.
Shortly before the publication of Predatory States, Paraguay established, through a law passed by Congress (Law 2225 of 2004), the Commission of Truth and Justice, to investigate enforced disappearances, extrajudicial executions, torture and other serious abuses, involuntary exile, and other grave violations of human rights. I am sure that Professor McSherry’s work will bring valuable clues to the Commission of Truth and Justice for the clarification of so many crimes against humanity.
Recovering the past is a significant undertaking, indispensable for countering the impunity that continues to reign and for ensuring that justice is made effective in the face of the appalling violations of human rights committed in the decade of the 1970s. The importance of not forgetting what happened has nothing to do with a thirst for revenge. On the contrary, the act of remembering serves the need to keep historical memory alive and allows us to analyze, with some distance, how an organized and deliberate plan existed to do the greatest possible harm to defenseless Latin American societies. In fact, Professor McSherry demonstrates that there was such a plan, systematic, organized, and planned in order to prepare the ground for the critical economic and political situation in which we find ourselves today, with the imposition of neoliberalism, political domination, and an unpayable external debt.
Predatory States is a genuine scientific addition to the clarification of a history that never should have befallen Latin America and an invaluable contribution to the culture of peace.

Martín Almada
The Right Livelihood Award (Alternative Nobel Prize) Laureate,
2002 Asunción, Paraguay, 2004



A Forth OS in 46 Bytes


A console is shown displaying a system’s startup information, followed by “Booting from Hard Disk …”, “Hello World!” in a green font, and “The keyboard is working!”

It’s not often that we can include an operating system in a Hackaday article, but here’s the full 46-byte source of [Philippe Brochard]’s 10biForthOS in 8086 opcodes:
50b8 8e00 31d8 e8ff 0017 003c 0575 00ea5000 3c00 7401 eb02 e8ee 0005 0588 eb47b8e6 0200 d231 14cd e480 7580 c3f4
Admittedly, this is quite a minimal operating system. It’s written for the Intel 8086, and consists of a Forth implementation with only two instructions: compile (1) and execute (0). It can receive commands over a serial connection or from a keyboard. This allows a host computer to load more complex software onto it, one byte at a time. In particular, [Philippe] provides instructions for loading more advanced compilers, such as subleq-eForth for a more complete Forth implementation, or SectorC for C programming. He’s also written a 217-byte port of the OS to Linux Intel x64.

[Philippe] doesn’t take a strong stance on whether this should technically qualify as a Forth implementation, given that the base implementation lacks stacks, dictionaries, and the ability to define words. However, it does have an outer and inner interpreter, the ability to compile and execute code, and most importantly, “the simplicity and hacky feeling of Forth.”

[Philippe] writes that this masterpiece of minimalism continues the tradition of the minimal Forth implementations we’ve covered before. We’ve even seen Forth run on an Arduino.


hackaday.com/2025/05/27/a-fort…

Maronno Winchester reshared this.




GAZA. Cominciata la distribuzione militarizzata del cibo


@Notizie dall'Italia e dal mondo
Ghf, la fondazione americana con sede in Svizzera, ha annunciato oggi di aver cominciato le proprie operazioni di distribuzione di cibo nella Striscia. Con solo 4 punti di smistamento, l'estromissione delle Nazioni unite e la protezione di società private piene di contractor statunitensi



La tutela del patrimonio culturale oltre i confini nazionali, assume una dimensione internazionale strategica. L'attività dei carabinieri impegnati in questa particolare attività



I Carabinieri del Comando Tutela Patrimonio Culturale (TPC) hanno - in ambito nazionale e locale - reso noti i risultati della loro attività operativa nel 2024. Un comunicato stampa del Ministero della Cultura (da cui questi carabinieri funzionalmente dipendono) riporta tali risultati. Ecco i punti principali:

  • Recupero di beni culturali: Sono stati recuperati 80.437 beni d’arte, con un valore stimato di circa 130 milioni di euro.
  • Sequestri di opere contraffatte: Sono stati sequestrati 2.804 falsi, di cui la maggior parte opere d'arte contemporanea, con un valore stimato di 311 milioni di euro.
  • Attività investigativa e repressione: Incremento delle operazioni, con un aumento dei controlli su musei, biblioteche, siti archeologici e mercati antiquariali. Sono state effettuate 505 perquisizioni, denunciate 1.356 persone e arrestate 2 persone.
  • Monitoraggio online: Controllati 696 siti web, recuperati 6.346 beni culturali e deferiti 122 soggetti.
  • Restituzione internazionale: Rimpatriati 882 beni culturali e restituiti 550 beni a Paesi esteri, tra cui Canada, Colombia, Ecuador, Messico e Iraq.
  • Tecnologia e innovazione: Sviluppo del sistema S.W.O.A.D.S. per il monitoraggio automatico delle opere d’arte rubate attraverso l’intelligenza artificiale.

Oltre i confini nazionali


Il lavoro svolto dai Carabinieri TPC continua a essere fondamentale per la tutela del patrimonio culturale italiano e internazionale.
Il Comando TPC ha dimostrato come la tutela del patrimonio culturale vada ben oltre i confini nazionali, assumendo una dimensione internazionale strategica. I Carabinieri hanno effettuato operazioni che hanno portato al rimpatrio di 882 beni culturali e alla restituzione di 550 opere alle ambasciate e istituzioni straniere. Tra gli interventi, spiccano quelle volte in cui oggetti di inestimabile valore sono stati riconsegnati a paesi come il Canada, la Colombia, l'Ecuador, El Salvador, il Guatemala, l'Iraq e il Messico, con una stretta collaborazione con le autorità diplomatiche e culturali dei rispettivi Paesi.
I caschi blu della cultura


Parallelamente alle tipiche operazioni di contrasto al traffico illecito, il Comando TPC si è impegnato anche nella condivisione delle competenze a livello internazionale. Un esempio emblematico è rappresentato dal corso "I Caschi Blu della Cultura" tenutosi a Rio de Janeiro, che ha coinvolto rappresentanti di Brasile, Cile, Colombia e Paraguay. Questa iniziativa formativa mira non solo a trasferire il know-how specifico in materia di tutela e intervento in situazioni di crisi, ma anche a creare un network strutturato per contrastare il traffico illecito dei beni culturali su scala globale.
La piattaforma informatica SWOADSnet


Un ulteriore tassello dell’approccio internazionale è l’avvio delle attività di sviluppo del sistema SWOADSnet. Quest’innovativa piattaforma è studiata per facilitare lo scambio di dati e metadati relativi alle opere d’arte con altri Paesi europei, in modo da monitorare in tempo reale i flussi illeciti e intervenire tempestivamente. La sinergia tra tecnologie avanzate e cooperazione internazionale permette così di creare una rete di sicurezza globale per il patrimonio artistico e culturale.
Questi risultati e iniziative evidenziano come le attività internazionali del Comando TPC siano parte integrante di una strategia più ampia: quella di salvaguardare il patrimonio non solo italiano, ma universale, promuovendo collaborazione, formazione e innovazione tecnologica.
Il documento riportante l'attività operativa del 2024 è reperibile a questa pagina web tpcweb.carabinieri.it/SitoPubb…
#Armadeicarabinieri #carabinieriTPC #TPC #Ministerodellacultura #mic

@Notizie dall'Italia e dal mondo



Difesa e stabilità regionale alla base del dialogo Italia-Arabia Saudita

@Notizie dall'Italia e dal mondo

Tra cooperazione industriale sulla difesa e sicurezza regionale, cresce l’asse Roma-Riad. Il colloquio tra il ministro della Difesa Guido Crosetto ed Ahmad Abdulaziz Al-Ohali, governatore per la General Authority for Military Industries dell’Arabia Saudita, evidenzia la



Grecia e Turchia alleate nella repressione. L’avvocato Günay Dağ in sciopero della fame


@Notizie dall'Italia e dal mondo
Il caso del legale svela una cooperazione politica che calpesta il diritto d’asilo e rafforza la repressione transnazionale.
L'articolo Grecia e Turchia alleate nella repressione. L’avvocato Günay Dağ in sciopero della fame proviene



Pd, M5S e Avs lavorano a una manifestazione per Gaza. E il 21 giugno a Roma scendono in piazza le associazioni


@Politica interna, europea e internazionale
Una cosa è certa: nelle prossime settimane in Italia ci sarà almeno una manifestazione per chiedere di porre fine al massacro perpetrato da Israele sulla Striscia di Gaza. Ma con ogni probabilità i cortei saranno due. Da una parte ci sono i




Governi privati e intelligenza artificiale. Il preprint dell'articolo di Daniela Tafani

A chi inquini il dibattito pubblico con inapplicabili linee guida, anemici standard tecnici e fantasie sulla moralizzazione di inesistenti menti artificiali, convogliando le istanze democratiche in qualche ininfluente consultazione pubblica, occorre ricordare che gli unici agenti artificiali esistenti sono le corporations, come Louis Brandeis osservava, e l'unico approccio democratico all'intelligenza artificiale è quello anti-monopolistico.

Qui il post di @danielatafani

zenodo.org/records/15522002

@Intelligenza Artificiale



Carlo Bava – Un paltò fuori stagione – settembre 1944 – maggio 1945
freezonemagazine.com/articoli/…
Le nostre vite cominciano a finire il giorno in cui stiamo zitti di fronte alle cose che contano. (Martin Luther King). L’epica della fuga, la lirica della salvezza. Con Un paltò fuori stagione, Carlo Bava ci consegna una narrazione intensa e necessaria, che attraversa uno dei momenti più drammatici della nostra storia


#GiochiDellaGioventù, dalle 9.30 allo stadio Olimpico di Roma la sfilata delle delegazioni alla presenza del Ministro dell’Istruzione e del Merito, Giuseppe Valditara, del Ministro per lo Sport e i Giovani, Andrea Abodi e del Presidente di Sport e Sa…


Eastern Turkiye. February 1980.

Lonely Planet’s “Across Asia on the cheap” describes Eastern Turkiye as the harshest part of the country and as “the area where the opium poppies used to grow and ... the kids, if not egged on by their parents are certainly not restrained and specialise in hurling stones through car windows.”

My bus ‘Befa’ was flagged down several hours inside the Turkish border, on route to Erzurum. Snow was ankle high. A tall, authoritative police superintendent sauntered up to Iain’s cab window, leaned his elbow against the window frame and, other hand out-stretched, palm up, demanded our bus paperwork. He had an intelligent savvy face, hardened by both the summer sun and winter wind.

Flicking through our paperwork and apparently finding one item out of date, he curtly summoned Iain and I to the police station, a spartan wooden building to the side of the road. Beside it was a huge pile of chopped wood in a corrugated iron lean-to.

Inside, the wooden floors were strewn with well-worn Turkish kilims and peasant rugs. Three filing cabinets, a large wooden desk cluttered with disorganised paperwork and two smaller tables for and the red deputies completed the furniture. A stern Mustafa Kemal frowned down from a photo above the main desk. Beside a clock hung the superintendent’s tertiary qualifications.

Iain and I downed bitter black cay and gratefully warmed ourselves in the heat emanating from the pot-bellied stove. On it sat a double tea-pot, samovar style. The commandant was less concerned with the legitimacy of our paperwork and more about chatting to foreigners. “Where are you from? Where are you going?” He was keen to boast that he was one of the youngest police chiefs in the country. “I am not surprised,” I thought, “this cold, remote location would hardly be sought after by qualified competition.” He was more astute than Barney Fife’ (the archetypal overzealous, inept deputy from the ‘60s ‘The Andy Griffiths Show’) but this was far from a thriving metropolis.

As time ticked on, my attention waned and my vision glazed over until, looking through his window, smudged and smeared by road dust ... I was stupefied to see three female punters possessing generous bare bottoms squatting to pee on the far side of our bus. I hastily rose, stuttered and blustered a few hasty words to distract the chief’s attention, thinking we were amazingly culturally insensitive. He DID see the three female butts but didn’t mind and, stifling a wry grin, waved away my apologies ...

When questioned later the three flashers (or was that mooners?) apologised profusely saying they were caught short! There was a nearby farmer checking his fences so they had limited choices. They were going to flash someone! I thought the obvious solution would have been to ask to use the police station’s facilities.

Fifteen minutes later, youths just outside a small township threw missiles accurately and smashed a back window. They scattered before we could catch them. The ‘inflated ego’ police chief also arrived, but could not find the culprits!

The tour before, buses Casper and Rags had taken the alternative Tahir Pass, 2400+ feet above sea level. Demanding. Hence I thought for Befa, the military road at lower altitude would be easier. On Casper, I was roused from my sleeping bag just before midnight. “ Everyone out!” Still groggy from slumping into a deep sleep after an extended driving period, I descended into a snow storm. Guaranteed to have you awake in seconds. Icy cold. Stinging snow was sleeting down diagonally to assault my face and hands. Casper was descending a winding gravel incline down a gully. Steep banks on either side. Inching along. Sliding. I went cab-side where Loxley shouted “Walk in front of the bus, Ian. Can we grip the road or will we slide into that bank?”

The next fifteen minutes was bitterly cold. I was inadequately dressed. The snow was bright in the glare of the spotlights but beyond that it was all guesswork. My face quickly became deadened and my feet were Arctic. I had to stamp them to get circulation moving. My body heat was leaching away … rapidly. Shivering uncontrollably, I glanced at Casper and through the headlights I could see the wipers swiping snow away in a metronomic rhythm. Behind them Loxley was squinting, peering, rubbing the condensation away from the inside, endeavouring to see the way forward.

Eventually the gradient straightened and flattened out. The punters clambered back in and we made progress.

The next morning, Casper and Rags were confronted with a Turkish articulated truck blocking the road. It’s cab hung precariously over a bank. The driver had experienced similar icy issues the night before. Other drivers looked subdued. They puffed on cigarettes and conversed. Stamping up and down on the berm’s mud to see if it could take a heavy weight, I stood with Trevor, both silently taking the situation in and weighing up our options. It was the first time I’d seen Trevor go so long without uttering a word. His mind was working overtime. I pointed out a possible way to get our buses around the truck. Trevor pondered.

The passing manoeuvre was successful with Casper but Rags, quickly descended further into the soil to tilt alarmingly. Steve in the cab seemed remarkably calm. Unfazed. I later learned Lodekka’s could lean over to an angle of twenty-eight degrees before toppling. A Turkish lorry came to our rescue. Trevor asked if he had a strong cable which he then wrapped around the two towing lugs attached to Rag’s chassis.

By reversing, Rags was successfully hauled out of the quagmire.



Sostieni il giornalista Roberto Antonini ingiustamente accusato di antisemitismo


Condivido questa petizione, soprattutto per i #ticinesi, o chi conosce il giornalista Roberto Antonini. Per i naufraghi e per chi non ne può più!

Non è #antisemitismo! Sottoscrivi la petizione – NAUFRAGHI/E
Sostieni il giornalista Roberto Antonini ingiustamente accusato di antisemitismo: naufraghi.ch/antonini/

Mi è dispiaciuto non manifestare sabato qui a Belli, avevo lezione 😔
#manifestazione #bellinzona #robertoantonini #petizione



di Diego Giachetti - Il libro, André Tosel, Sulla crisi storica del marxismo. Saggi, note e scritti italiani, a cura di Sergio Dalmasso, pubblicato da Mimesis (2025), è il compimento di un debito personale verso l’autore, che il curatore ha avuto la fortuna di conoscere. Omaggio a un pensiero complesso, un interrogarsi che ha percorso [...]


Diario misofonico


Diario misofonico.

Sabato 24/5/2025
Concerto di brani di Bach e figlio per coro, organo e flauto traverso. Luogo: chiesa di un paese vicino. Ad un certo punto nel banco dietro a quello dove ero seduto arriva un tizio (in tuta, ma vabbe') che si mette a ballonzolare con gambe e piedi sull'asse inginocchiatoio, facendo quindi tremare la mia seduta. Cerco di resistere un po' , poi dato che non la smette mi sposto in un altro banco. Davanti a me c'è un tizio che impasta le labbra e una volta al minuto se ne esce con un bel "spciok!", va avanti un po' poi miracolosamente la smette e posso godermi il concerto.

Domenica 25/5/2025
Piccolo incontro con una suora che parla della sua esperienza in Kenya. Seduto di fianco a un 14enne che mastica la sua bella gomma, spesso aprendo la bocca e facendo un rumore in realtà sommesso, che però per la vicinanza mi dà un fastidio bestia. Occhiatacce, ma lui non se ne accorge nemmeno.

Lunedì 26/5/2025
Conferenza nel tardo pomeriggio. Alcuni posti alla mia destra una signora sui 65-70 anni, che mastica anche lei la sua bella gomma con la bocca spesso aperta (insisto a dire che a me, e sono dell'89, hanno insegnato che le labbra si tengono serrate). Qui il rumore era più forte. Anche qui occhiatacce (non solo mie) e lei non le nota minimamente. Dettaglio: questa signora è/era insegnante, quindi un po' di buone maniere dovrebbe conoscerle. Ad ogni modo sto per alzarmi per dirle se può almeno tenere la bocca chiusa, ma vedo che se la toglie e finalmente rimane in silenzio per il resto della conferenza.

CHE FATICA.

#misofonia



Instagram e Facebook, ultimo giorno per opporsi all’uso dei dati per IA


Instagram e Facebook, ultimo giorno per opporsi all’uso dei dati per IA

rsi.ch/info/mondo/Instagram-e-…

🤢

#meta #Instagram #faceebook #addestramentointelligenzaartificiale #addestramentoIA #AI

Saxinmysocks reshared this.



Risultati elezioni comunali: Genova e Ravenna al centrosinistra. Ballottaggio a Taranto e Matera


@Politica interna, europea e internazionale
Genova e Ravenna al centrosinistra, ballottaggio a Taranto e Matera: sono i risultati delle elezioni comunali che hanno coinvolto centoventisei con circa due milioni di elettori chiamati alle urne. L’affluenza parziale, registrata alla chiusura dei seggi, è al 57,35%, con la



PODCAST. Israele celebra l’occupazione di Gerusalemme


@Notizie dall'Italia e dal mondo
Migliaia di israeliani sfilano nel "giorno di Gerusalemme" per affermare il controllo totale della città da parte dello stato ebraico. Prevista anche la "marcia delle bandiere" nella zona palestinese. Provocazioni e violenze a danno della popolazione araba. Il podcast di Michele Giorgio
L'articolo