Salta al contenuto principale



Testing Your Knowledge of JavaScript’s Date Class


JavaScript is everywhere these days, even outside the browser. Everyone knows that this is because JavaScript is the best programming language, which was carefully assembled by computer experts and absolutely not monkeyed together in five days by some bloke at Netscape in the 90s. Nowhere becomes this more apparent than in aspects like JavaScript’s brilliantly designed Date class, which astounds people to this day with its elegant handling of JavaScript’s powerful type system. This is proudly demonstrated by the JS Date quiz by [Samwho].

Recently [Brodie Robertson] decided to bask in the absolute glory that is this aspect of JavaScript, working his way through the quiz’s 28 questions as his mind gradually began to crumble at the sheer majesty of this class’ elegance and subtle genius. Every answer made both logical and intuitive sense, and left [Brodie] gobsmacked at the sheer realization that such a language was designed by mere humans.

After such a humbling experience, it would only seem right to introduce the new JS convert to the book JavaScript: The Good Parts, to fully prepare them for their new career as a full-stack JS developer.

youtube.com/embed/IRX5TuggMxg?…


hackaday.com/2025/07/21/testin…



A Lockpicking Robot That Can Sense the Pins


Having a robot that can quickly and unsupervised pick any lock with the skills of a professional human lockpicker has been a dream for many years. A major issue with lockpicking robots is however the lack of any sensing of the pins – or equivalent – as the pick works its magic inside. One approach to try and solve this was attempted by the [Sparks and Code] channel on YouTube, who built a robot that uses thin wires in a hollow key, load cells and servos to imitate the experience of a human lockpicker working their way through a pin-tumbler style lock.

Although the experience was mostly a frustrating series of setbacks and failures, it does show an interesting approach to sensing the resistance from the pin stack in each channel. The goal with picking a pin-tumbler lock is to determine when the pin is bound where it can rotate, and to sense any false gates from security pins that may also be in the pin stack. This is not an easy puzzle to solve, and is probably why most lockpicking robots end up just brute-forcing all possible combinations.

Perhaps that using a more traditional turner and pick style approach here – with one or more loadcells on the pick and turner- or a design inspired by the very effective Lishi decoding tools would be more effective here. Regardless, the idea of making lockpicking robots more sensitive is a good one, albeit a tough nut to crack. The jobs of YouTube-based lockpicking enthusiasts are still safe from the robots, for now.

Thanks to [Numbnuts] for the tip.

youtube.com/embed/-EqSJTBMepA?…


hackaday.com/2025/07/21/a-lock…


in reply to Mro

@mro@poliverso.orgAvete notato?

Chi scrive sciocchezze qualunquiste, conformiste e con l'intento di polarizzare nascondendo la complessità delle opinioni altrui, tende ad attribuire a sé nomi altisonanti.

Per come chiamarli, lascerei alla libera fantasia del turpiloquio di chi legge.

@Mro


quale è il senso, quando acquisti una radio, di consegnarti in formato A2 lo schema elettrico completo, ma non i sorgenti del software? non pare evidente che manca qualcosa?


A tutto ritmo sulle rive del lago allo Scanno Jazz Festival


@Giornalismo e disordine informativo
articolo21.org/2025/07/a-tutto…
Sabato 2 e domenica 3 agosto attesi Di Battista, Marciante, Mellone e Boldi a Scanno (Aq) per due serate di grande musica nel Parco nazionale d’Abruzzo. Immaginate un luogo magico, dove montagne



2025 One-Hertz Challenge: It’s Hexadecimal Unix Time


[danjovic] came up with a nifty entry for our 2025 One-Hertz Challenge that lands somewhere between the categories of Ridiculous and Clockwork. It’s a clock that few hackers, if any, could read on sight—just the way we like them around here!

The clock is called Hexa U.T.C, which might give you an idea why this one is a little tricky to parse. It displays the current Unix time in hexadecimal format. If you’re unfamiliar, Unix time is represented as the number of non-leap seconds that have ticked by since 1 January 1970 at 00:00:00 UTC. Even if you can turn the long hex number into decimal in your head, you’re still going to have to then convert the seconds into years, days, hours, minutes, and seconds before you can figure out the actual time.

The build relies on an ESP32-S2 module, paired with a 7-segment display module driven by the TM1638 I/O expander. The ESP32 syncs itself up with an NTP time server, and then spits out the relevant signals to display the current Unix time in hex on the 7-segment displays.

It’s a fun build that your programmer friends might actually figure out at a glance. As a bonus it makes an easy kicking-off point for explaining the Year 2038 problem. We’ve featured other similar Unix clocks before, too. Video after the break.

youtube.com/embed/git1te5nhhI?…

2025 Hackaday One Hertz Challenge


hackaday.com/2025/07/21/2025-o…



Il tempo della fine, di Katrine Engberg


@Giornalismo e disordine informativo
articolo21.org/2025/07/il-temp…
Un thriller avvincente, intenso e, al contempo, intimo, in cui i protagonisti sono accomunati dall’essere in fuga dal proprio passato, pressati dai propri demoni personali, ma con il quale dovranno fare necessariamente i conti per potersene finalmente



VITA DIGITALE ED ATTIVITà DI POLIZIA: QUALI ADATTAMENTI?

Un rapporto dell'Innovation Lab di Europol esplora come la polizia può adattarsi alla vita sempre più digitale dei cittadini europei. I mondi online sono sempre più percepiti come senza legge e, mentre gli agenti di polizia di comunità svolgono un ruolo chiave nel mondo fisico, gli equivalenti della polizia di prossimità sono spesso agli inizi o assenti nei mondi virtuali.

Polizia online nell'UE

L’Unione Europea sta lavorando per combattere la criminalità online stabilendo una forte presenza online per le forze dell’ordine. L'Innovation Lab di Europol e il gruppo strategico sulla polizia online dell'European Clearing Board hanno creato un documento concettuale sulla polizia in un mondo online. Questo documento fornisce linee guida affinché le forze dell’ordine siano visibili, trasparenti e affidabili online e creino fiducia nelle comunità difficili da raggiungere.

Punti chiave:


  • L'Innovation Lab di Europol mira a identificare e sviluppare soluzioni innovative a sostegno dell'applicazione della legge.
  • L'European Clearing Board for Innovation riunisce i punti di contatto unici degli Stati membri dell'UE per condividere progetti e strumenti innovativi.
  • Il documento concettuale fornisce linee guida per la polizia online, inclusa la visibilità, la trasparenza e l'affidabilità.


In particolare, sulle linee guida per la polizia online, come evidenziate nel concetto di "polizia in un mondo online" di Europol:

Visibilità online


  • La polizia deve essere presente ovunque i cittadini siano online, per fornire sicurezza e protezione come nel mondo fisico.
  • Molti cittadini sono più a loro agio nel contattare la polizia online piuttosto che per telefono, quindi è importante abbassare la soglia per il contatto.


Trasparenza online


  • La polizia deve essere visibile e trasparente nelle sue interazioni online con i cittadini.
  • Questo aiuta a costruire fiducia con gruppi target difficili da raggiungere e a rischio.


Affidabilità online


  • La polizia deve creare fiducia con i cittadini nelle comunità virtuali, proprio come nel mondo fisico.
  • Questo è essenziale per combattere le reti criminali che si stanno espandendo nelle comunità virtuali.


In sintesi, queste linee guida mirano a rendere la polizia una presenza rassicurante e affidabile nell'ambiente online, in modo da prevenire che le comunità online diventino spazi senza legge. La visibilità, la trasparenza e l'affidabilità sono elementi chiave per raggiungere questo obiettivo.

La pubblicazione Europol, Policing in an online world - relevance in the 21st century, Publications Office of the European Union, Luxembourg, 2025 è scaricabile qui europol.europa.eu/publications…

@Informatica (Italy e non Italy 😁)



Freezer Monitoring: Because Ice Cream Is a Dish Best Served Cold


This image created using GPT-4o on Poe using the prompt “picture of an upright freezer connected to a computer for temperature monitoring, together with a graph and an alarm siren. Suitable for a professional blog. Be humorous and use a vintage theme.”

[Scott Baker] wrote in to let us know about his freezer monitor.

After a regrettable incident where the ice cream melted because the freezer failed [Scott] decided that what was called for was a monitoring and alerting system. We enjoyed reading about this hack, and we’ll give you the details in just a tick, but before we do, we wanted to mention [Scott]’s justifications for why he decided to roll his own solution for this, rather than just using the bundled proprietary service from the white goods manufacturer.

We’re always looking for good excuses for rolling our own systems, and [Scott]’s list is comprehensive: no closed-source, no-api cloud service required, can log with high fidelity, unlimited data retention, correlation with other data possible, control over alerting criteria, choice of alerting channels. Sounds fair enough to us!

The single-board computer of choice is the Raspberry Pi Zero 2 W. As [Scott] says, it’s nice to be able to SSH into your temperature monitoring system. The sensor itself is the DS18B20. [Scott] 3D printed a simple case to hold the electronics. The other materials required are a 4.7k resistor and a power cable. The instructions for enabling the 1-wire protocol in Raspbian are documented in INSTALL.md.

When it comes time for programming, [Scott’s] weapon of choice is GoLang. He uses Go to process the file system exported by the 1-wire drivers under /sys/bus/w1/devices. He sets the Pi Zero up as an HTTP endpoint for Prometheus to scrape. He uses a library from Sergey Yarmonov to daemonize his monitoring service.

Then he configures his ancient version of Prometheus with the requisite YAML. The Prometheus configuration includes specifications of the conditions that should result in alerts being sent. Once that’s done, [Scott] configures a dashboard in Grafana. He is able to show two charts using the same timescale to correlate garage energy usage with freezer temperatures. Mission accomplished!

Now that you know how to make a freezer monitor, maybe it’s time to make yourself a freezer.


hackaday.com/2025/07/21/freeze…



"They could fix this problem. One of their talented software engineers could stop this fraudulent practice in its tracks, if they had the will to do so."#News
#News


The NIH wrote that it has recently “observed instances of Principal Investigators submitting large numbers of applications, some of which may have been generated with AI tools."#AI #NIH


The NIH Is Capping Research Proposals Because It's Overwhelmed by AI Submissions


The National Institutes of Health claims it’s being strained by an onslaught of AI-generated research applications and is capping the number of proposals researchers can submit in a year.

In a new policy announcement on July 17, titled “Supporting Fairness and Originality in NIH Research Applications,” the NIH wrote that it has recently “observed instances of Principal Investigators submitting large numbers of applications, some of which may have been generated with AI tools,” and that this influx of submissions “may unfairly strain NIH’s application review process.”

“The percentage of applications from Principal Investigators submitting an average of more than six applications per year is relatively low; however, there is evidence that the use of AI tools has enabled Principal Investigators to submit more than 40 distinct applications in a single application submission round,” the NIH policy announcement says. “NIH will not consider applications that are either substantially developed by AI, or contain sections substantially developed by AI, to be original ideas of applicants. If the detection of AI is identified post award, NIH may refer the matter to the Office of Research Integrity to determine whether there is research misconduct while simultaneously taking enforcement actions including but not limited to disallowing costs, withholding future awards, wholly or in part suspending the grant, and possible termination.”

Starting on September 25, NIH will only accept six “new, renewal, resubmission, or revision applications” from individual principal investigators or program directors in a calendar year.

Earlier this year, 404 Media investigated AI used in published scientific papers by searching for the phrase “as of my last knowledge update” on Google Scholar, and found more than 100 results—indicating that at least some of the papers relied on ChatGPT, which updates its knowledge base periodically. And in February, a journal published a paper with several clearly AI-generated images, including one of a rat with a giant penis. In 2023, Nature reported that academic journals retracted 10,000 "sham papers," and the Wiley-owned Hindawi journals retracted over 8,000 fraudulent paper-mill articles. Wiley discontinued the 19 journals overseen by Hindawi. AI-generated submissions affect non-research publications, too: The science fiction and fantasy magazine Clarkesworld stopped accepting new submissions in 2023 because editors were overwhelmed by AI-generated stories.

According to an analysis published in the Journal of the American Medical Association, from February 28 to April 8, the Trump administration terminated $1.81 billion in NIH grants, in subjects including aging, cancer, child health, diabetes, mental health and neurological disorders, NBC reported.

Just before the submission limit announcement, on July 14, Nature reported that the NIH would “soon disinvite dozens of scientists who were about to take positions on advisory councils that make final decisions on grant applications for the agency,” and that staff members “have been instructed to nominate replacements who are aligned with the priorities of the administration of US President Donald Trump—and have been warned that political appointees might still override their suggestions and hand-pick alternative reviewers.”

The NIH Office of Science Policy did not immediately respond to a request for comment.


#ai #nih


Fixing Human Sleep With Air Under Pressure


By and large, the human body is designed to breathe from birth, and keep breathing continuously until death. Indeed, if breathing stops, lifespan trends relatively rapidly towards zero. There’s a whole chunk of the brain and nervous system dedicated towards ensuring oxygen keeps flowing in and carbon dioxide keeps flowing out.

Unfortunately, the best laid plans of our body often go awry. Obstructive sleep apnea is a condition in which a person’s airways become blocked by the movement of soft tissues in the throat, preventing the individual from breathing. It’s a mechanical problem that also has a mechanical solution—the CPAP machine.

Under Pressure

Obstructive sleep apnea occurs when the airway is blocked when muscle tone relaxes during sleep. Credit: public domain
The underlying mechanism of obstructive sleep apnea (OSA) is quite straightforward. During sleep, as the throat, neck, and skeletal muscles all relax, the tongue and/or soft palette can come to block the airway. When this happens, fresh air cannot pass to the lungs, nor can the individual exhale. Breathing is effectively halted, sometimes for minutes at a time. As the individual’s oxygen saturation drops and carbon dioxide levels build up, the brain and nervous system typically trigger an arousal in which the person enters a lighter stage of sleep or wakes up to some degree. The arousal may simply involve a change of position to restore normal breathing, or the individual may wake more fully while gasping for air. Having cleared the airway and resumed normal respiration, the individual generally returns to deeper sleep. As they do, and the muscles relax again, a further obstructive apnea may occur with similar results.

For those suffering from sleep apnea, these arousals can occur many hundreds of times a night. Each disrupts the normal cycles of sleep, generally leading to symptoms of serious sleep deprivation. These arousals often occur without the individual having any awareness they occurred. Sleep apnea can thus easily go undiagnosed, as individuals do not know the cause of their fatigue. In many cases, reports of heavy snoring from sleeping partners are what leads to a sleep apnea diagnosis, as breathing typically becomes louder as the airway slowly closes due to the muscles relaxing during sleep.

Ultimately, the solution to sleep apnea is to stop the airway becoming blocked in the first place, allowing normal breathing to continue all the way through sleep. The problem is that it’s difficult to access the tissues deep in the airway. One might imagine placing some kind of mechanical device into the throat to keep the airway open, but this would be highly invasive. It would also likely pose a choking risk if disrupted during sleep.
The ResMed AirSense 10 Elite, a modern CPAP machine. Note the humidifier attached on the side. This helps reduce instances of dry mouth or similar issues during use. Credit: VSchagow, CC BY-SA 4.0
Enter the CPAP machine—short for “continuous positive airway pressure.” Invented by Australian doctor Colin Sullivan in 1980, the idea behind it is simple—pressurize the individual’s airway in order to hold it open and prevent the tongue and soft tissues from causing a blockage. Air pressures used are relatively low. Machines typically deliver in the range of 4 to 20 cm H2O, which has been found sufficient to keep an airway open during sleep. The CPAP machine doesn’t breathe for the user—it just provides air to the airway at greater than atmospheric pressure.
A Lowenstein Prisma SMART CPAP machine, with hose and mask attached. Credit: Mnalis, CC0
Key to the use of CPAP is how to get the pressurized air inside the airway. Early machines pressurized a large helmet, with an air seal around the neck. Today, modern CPAP machines deliver carefully-controlled pressurized air via a mask. Nasal masks are the least-invasive option, which pressurize the whole airway via the nostrils alone. These masks require that the mouth remain closed during sleep, else the pressurized air is free to leave the airway. Full-face masks, which are similar to those used for other medical procedures, can be used for individuals who need to breathe through their mouth while sleeping.

Overall, a CPAP machine is relatively simple to understand. It consists of a pump to provide pressurized air to the mask, and a user interface for configuring the pressure and other settings. CPAP machines often also feature humidification to stop the supplied air from drying out the user’s mouth and/or nose. This can be paired with heated tubing to warm the air, which avoids condensation from forming in the tube or mask during use. This is called “rainout” and can be unpleasant for the user. Modern machines can also carefully monitor pressure levels and airflow, logging breathing events and other data for later analysis.
A full face mask for use with a CPAP machine. Nasal-only masks are also popular. Credit: public domain
CPAP treatment is not without its issues, however. Users must grow accustomed to wearing a mask while sleeping, as well as adjust to the feeling of breathing in and exhaling out against the continuous incoming pressure from the machine. It’s also important for users to get a suitable mask fit, to avoid issues like skin redness or pressure leaking from the mask. In the latter case, a CPAP machine will be ineffective at keeping an airway open if pressure is lost via leaks. These problems lead to relatively low compliance with CPAP use among those with obstructive sleep apnea. Studies suggest 8% to 15% abandon CPAP use after a single night, while 50% stop using CPAP within their first year. Regardless, the benefits of CPAP machines are well-supported by the available scientific literature. Studies have shown that use of CPAP treatment can reduce sleepiness, blood pressure, and the prevalence of motor vehicle crashes in those with obstructive sleep apnea.

Nobody likes the idea of being semi-woken tens or hundreds of times a night, but for sleep apnea sufferers, that’s precisely what can happen. The CPAP machine is the mechanical solution that provides a good night’s rest, all thanks to a little pressurized air.

Featured image: “wide variety of masks at cpap centra” by [Rachel Tayse]. (Gotta love that title!)


hackaday.com/2025/07/21/fixing…



cari "amici" israeliani... che la guerra sia colpa di hamas non ci crede più nessuno... perché da quegli iniziali ostaggi israeliani voi nel frattempo ne avete uccisi mille volte tanti... e non erano terroristi e quindi beh... siete voi peggio dei hitler


#Cina: Canberra aggiusta il tiro?


altrenotizie.org/primo-piano/1…


I militari francesi abbandonano anche il Senegal


@Notizie dall'Italia e dal mondo
Dopo aver dovuto lasciare Mali, Ciad, Burkina Faso, Niger, Costa d'Avorio e Gabon, su richiesta di Dakar le truppe francesi hanno abbandonato anche il Senegal
L'articolo I militari francesi abbandonano anche il Senegal pagineesteri.it/2025/07/21/afr…




“Il tetto di 6 mesi per i licenziamenti è incostituzionale”. La Consulta dà ragione alla Cgil


“Il tetto di sei mesi per i licenziamenti è incostituzionale”. La Consulta dá ragione alla Cgil. Per la Corte “il criterio fisso non garantisce adeguatezza e congruità del risarcimento”. La sua cancellazione faceva parte dei quesiti al referendum


Nonostante il menefreghismo dei lavoratori Italiani il sindacato è riuscito lo stesso a far sparire una norma ingiusta.

Peccato che ne beneficieranno anche quelli a cui non importa nulla dei loro diritti. Gente che magari si convincerà anche che in fondo hanno fatto bene a starsene a casa tanto poi il risultato lo raggiunge qualcuno altro per loro.

cgiltoscana.it/2025/07/21/il-t…

reshared this

in reply to Max 🇪🇺🇮🇹

quando leggi commenti del tipo "le leggi si fanno in parlamento non con i referendum" oppure "i sindacati sono contro i lavoratori soprattutto Landini" capisci quanto ignorante è l'Italiano medio


L’Alleanza degli Stati del Sahel: un peso crescente nella regione


@Notizie dall'Italia e dal mondo
Il 6 luglio 2025 si è celebrato un anno dalla creazione della Confederazione degli Stati del Sahel. Un passaggio che ha ampliato e rafforzato gli obiettivi dell’Alleanza degli Stati del Sahel (Aes), istituita il 16 settembre 2023 da Mali, Burkina Faso e Niger. A seguito
L'articolo





Che cos’è l’Alleanza degli Stati del Sahel e il suo peso nella regione


@Notizie dall'Italia e dal mondo
Il 6 luglio 2025 si è celebrato un anno dalla creazione della Confederazione degli Stati del Sahel. Un passaggio che ha ampliato e rafforzato gli obiettivi dell’Alleanza degli Stati del Sahel (Aes), istituita il 16 settembre 2023 da Mali, Burkina Faso e Niger. A seguito




Kyiv è un laboratorio per la difesa comune. Borsari spiega perché

@Notizie dall'Italia e dal mondo

La guerra su larga scala scatenata dalla Russia contro l’Ucraina ha segnato una cesura nella storia della sicurezza europea. Ma accanto alle devastazioni e alle sofferenze, il conflitto ha anche innescato un processo senza precedenti di innovazione tattica, tecnologica e industriale. In



Difesa europea, cosa significa il nuovo patto di Difesa tra Londra e Berlino

@Notizie dall'Italia e dal mondo

Il Regno Unito e la Germania hanno firmato, per la prima volta dalla fine della Seconda guerra mondiale, un accordo bilaterale di mutua difesa. Il Kensington Treaty, così viene chiamato, prevede infatti una clausola di assistenza militare reciproca in caso di aggressione, vincolante anche al di



In tests involving the Prisoner's Dilemma, researchers found that Google’s Gemini is “strategically ruthless,” while OpenAI is collaborative to a “catastrophic” degree.

In tests involving the Prisonerx27;s Dilemma, researchers found that Google’s Gemini is “strategically ruthless,” while OpenAI is collaborative to a “catastrophic” degree.#llms #OpenAI




GAZA. L’esercito israeliano attacca in massa Deir al Balah. Migliaia di civili in fuga


@Notizie dall'Italia e dal mondo
L'estensione dell'offensiva "Carri di Gedeone" porta morte e distruzione nell'area di Gaza colpita relativamente di meno dopo il 7 ottobre 2023
L'articolo GAZA. L’esercito israeliano attacca in massa Deir al Balah. Migliaia di civili in



Infostealer data can include passwords, email and billing addresses, and the embarrassing websites you use. Farnsworth Intelligence is selling to to divorce lawyers and other industries.#News #OSINT


A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors


When your laptop is infected with infostealing malware, it’s not just hackers that might get your passwords, billing and email addresses, and a list of sites or services you’ve created accounts on, potentially including some embarrassing ones. A private intelligence company run by a young founder is now taking that hacked data from what it says are more than 50 million computers, and reselling it for profit to a wide range of different industries, including debt collectors; couples in divorce proceedings; and even companies looking to poach their rivals’ customers. Essentially, the company is presenting itself as a legitimate, legal business, but is selling the same sort of data that was previously typically sold by anonymous criminals on shady forums or underground channels.

Multiple experts 404 Media spoke to called the practice deeply unethical, and in some cases the use of that data probably illegal. The company is also selling access to a subset of the data to anyone for as little as $50, and 404 Media used it to uncover unsuspecting victims’ addresses.

The activities of the company, called Farnsworth Intelligence, show a dramatic shift in the bevvy of companies that collect and sell access to so-called open source intelligence, or OSINT. Historically, OSINT has included things like public social media profiles or flight data. Now, companies increasingly see data extracted from peoples’ personal or corporate machines and then posted online as fair game not just to use in their own investigations, but to repackage and sell too.

“To put it plainly this company is profiting off of selling stolen data, re-victimizing people who have already had their personal devices compromised and their data stolen,” Cooper Quintin, senior public interest technologist at the Electronic Frontier Foundation (EFF), told 404 Media. “This data will likely be used to further harm people by police using it for surveillance without a warrant, stalkers using it to gather information on their targets, high level scams, and other damaging motives.”

💡
Do you know anything else about people selling data to debt collectors or these other industries? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

Infostealers are pieces of malware, often stealthily bundled in a piece of pirated software, that steal a victim’s cookies, login credentials, and often more information stored in their browser too. On its website, Farnsworth lays out several potential uses for that stolen data. This includes “skip tacing,” presumably a typo of skip tracing, which is where a private individual or company tracks someone down who owes a debt. The website says users can “find debtors up-to-date addresses.” Another use case is to “Find high impact evidence that can make/break the case of million dollar lawsuits, high value divorce cases, etc.” A third is to “generate lead lists of customers/users from competitors [sic] companies,” because the data could show which competing products they have login credentials for, and, presumably, use.

Calli Schroeder, senior counsel at the Electronic Privacy Information Center (EPIC), told 404 Media that the use cases Farnsworth offers are “not only morally questionable [...] but may not be legal or usable in some cases.” For the litigation one, courts are split on using stolen information as evidence in legal proceedings. When hackers targeted the dating site Ashley Madison, for example, a judge ruled that despite the data being publicly published it was still confidential and stolen and couldn’t be used. Most judges will not allow illegally obtained evidence in divorce proceedings either, Schroeder said.

Then for using the data to build a list of customers of competitors, Schroeder said that “may very well fall under corporate espionage and trade secrets violations, depending on what information is taken.”

“This is so gross and predatory. They are facilitating and enabling further exploitation of victims of a crime and bragging about how multiple criminal acts make their business better. Moral bankruptcy is common in this industry, but I rarely see a company so proud of it,” Schroeder added.
playlist.megaphone.fm?p=TBIEA2…
Farnsworth did not respond to multiple requests for comment. Aidan Raney, the company’s 23 year-old founder, did not respond to multiple Signal messages sent to an account he has previously used to communicate with 404 Media.

Farnsworth offers two infostealer related products. The first is Farnsworth’s “Infostealer Data Platform,” which lists those above use cases. This can display hacking victims’ full text passwords, and requires potential users to contact Farnsworth for access. The company asks applicants to explain their use case, and can include “private investigations, intelligence, journalism, law enforcement, cyber security, compliance, IP/brand protection,” and several others, according to its website.

The second product is infostealers.info, a publicly available service that requires no due diligence to enter. It only asks for a minimum of $50 to search through the results. These don’t include victims’ full passwords, but the platform still includes a wide range of sensitive information. Recently infostealers.info introduced the ability to search for data stored in a hacking victim’s autofill. That is, data stored in the browser for convenience that can automatically populate when filling out a form, such as a billing address. Using this tool, 404 Media was able to extract multiple peoples’ billing addresses. One was in Staten Island, New York, which appeared to be someone’s private residence. Another address was in India.

Inside the Massive Crime Industry That is Hacking Billion Dollar Companies
When you download that piece of pirated software, you might be also getting a piece of infostealer malware, and entering a highly complex hacking ecosystem that is fueling some of the biggest breaches on the planet.
404 MediaJoseph Cox


In other words, these people had been hacked, and now anyone with $50 was able to search through data stolen from their computer.

“This should also be an example of how once your data is lost in a breach you can't control what will happen to it. It can be used by law enforcement, stalkers, scammers, advertisers, or anyone with access to it. It's a stark reminder of why digital security is important even if you think you have nothing to hide,” Quintin from the EFF added.

Hackers running infostealer operations often create Telegram channels where they upload personal data their malware has stolen. Other criminals can then pay to access this stolen data. The administrator of one prolific infostealer campaign previously told 404 Media “this brings us good income, but I am not ready to disclose specific amounts.” Infostealers operators often then publish stolen credentials on Telegram for free, likely as a way to advertise their paid offerings. Farnsworth did not respond when asked if it is buying this stolen data from hackers to then put into its product.

Cybersecurity researchers have used infostealer data to unmask criminals. Hudson Rock, another company that sells infostealer-related services, used it to uncover information on two alleged fraudsters on the FBI’s Most Wanted List. Last year cybersecurity firm RecordedFuture said it found 3,334 unique credentials used to access child abuse imagery websites. It says it used that data to identify two individuals. In a LinkedIn post on Tuesday, Raney said the company has explored its own dataset in a similar way.

But those are different use cases to selling infostealer data on the open market or for potentially illegal use cases.

Quintin said “It would be illegal and unethical to sell stolen cell phones even if you didn't steal them yourself, and I don't see how this is any different.”




Wikipedia: Warum das Ehrenamt zählt und bezahltes Schreiben trotzdem sinnvoll ist


netzpolitik.org/2025/wikipedia…



Siamo entrati nel degrado più totale. Paese fallito in tutto, a livello morale, politico, civile, culturale ed educativo.

Annullato concerto del direttore d’orchestra russo nella Reggia di Caserta – Imola Oggi
imolaoggi.it/2025/07/21/annull…



#EXPO2025 Osaka, alcuni scatti della visita del Ministro Giuseppe Valditara a “#ScuolaFutura Italia Osaka 2025” dove ha incontrato le tante #scuole italiane presenti.

Qui l’album ▶️flic.kr/s/aHBqjCngoC



in reply to Informa Pirata

Condivido e rinvio al recente video blog di @thelinuxEXP a proposito del cambio di software proprietari per liberi, anche motivati dall'assenza in Europa di alternative valide. Pertanto, il passaggio al libero - che non rappresenta un paese - é motivato perché non vogliamo lasciare nostri dati in America o Cina.

reshared this



e noi stiamo a discutere se sostenere israele perché sono una "democrazia" "compiuta" e perché loro fanno il gay pride? ma chi sostiene israele vada a cagare... senza se e senza ma.


SirJoe Polito – Black & White
freezonemagazine.com/articoli/…
La carriera di un musicista può essere un lungo percorso fatto di ricerca, costanza, fatica, migliaia di chilometri fatti per compensi che quasi mai coprono i costi reali. Ci vuole, diciamolo chiaramente, una grande volontà di restare in quella categoria di “never surrender” che ti fa guadagnare stima e rispetto di ascoltatori, fans, amici. Black […]
L'articolo SirJoe Polito – Black & White provie


Scommettete che diranno che sono stati i russi?


Maxi attacco hacker a SharePoint Server: colpite agenzie governative e aziende
Un gruppo di hacker ha sfruttato una vulnerabilità nel software SharePoint Server di Microsoft per lanciare un attacco globale, colpendo agenzie governative statunitensi, università, aziende energetiche e un gruppo di comunicazione asiatico. L’attacco ha interessato installazioni locali del software, non la versione cloud SharePoint Online. Microsoft ha rilasciato un aggiornamento urgente e lavora a ulteriori correzioni. Le autorità di USA, Canada e Australia indagano, con migliaia di server ancora a rischio. L’origine e gli obiettivi del gruppo restano ignoti. Eye Security ha rilevato oltre 50 violazioni, ma i nomi delle vittime sono coperti da accordi di riservatezza.



In Valle d’Aosta comincia domani la discussione su “Liberi Subito”


Entra ufficialmente nel calendario dei lavori del Consiglio regionale della Valle d’Aosta la proposta di legge regionale “Liberi Subito”, volta a garantire tempi e procedure certe per l’accesso al suicidio medicalmente assistito, nel rispetto dei principi indicati dalla sentenza 242/2019 della Corte costituzionale.

La discussione della proposta figura infatti nel calendario del Consiglio regionale per i lavori dal 22 al 24 luglio, come punto 12 dell’ordine del giorno e confidiamo che il Consiglio affronti il tema con serietà e responsabilità verso i propri cittadini come già fatto dalla Regione Toscana.

Il testo della proposta, depositato nel febbraio 2024 dalle consigliere regionali di opposizione Erika Guichardaz e Chiara Minelli, ha iniziato l’iter di discussione il 3 luglio dello scorso anno. L’approvazione del testo rappresenterebbe un primo passo per regolamentare, nel rispetto dei principi costituzionali e delle competenze regionali, l’accesso al suicidio medicalmente assistito per le persone che si trovano nelle condizioni definite dalla sentenza 242/2019: persone maggiorenni, capaci di autodeterminarsi, affetti da patologie irreversibili e fonte di sofferenze fisiche o psicologiche intollerabili, tenuti in vita da trattamenti di sostegno vitale.

“A quasi sei anni dalla sentenza 242 – dichiara Marco Cappato – non possiamo accettare che i cittadini debbano ancora affrontare ostacoli, attese e arbitri, pur avendo diritto ad accedere legalmente al suicidio assistito. La proposta “Liberi Subito” si muove nel solco tracciato dalla Corte costituzionale nel rispetto delle competenze regionali. Non introduce quindi un nuovo diritto, ma si limita a regolamentare le procedure sanitarie di accertamento delle condizioni di salute della persona che fa richiesta di accesso alla pratica. Auspichiamo che il Consiglio regionale della Valle d’Aosta, al di là delle appartenenze politiche, dia prova di responsabilità e rispetto per la volontà delle persone malate”.

— Approfondimento: le Regioni coinvolte dalle Proposte di legge sul Fine vita —


La sentenza 242/2019 della Corte costituzionale sul caso Cappato/Antoniani, garantisce l’accesso all’aiuto alla morte volontaria, il cosiddetto “suicidio assistito” nel nostro Paese, individuando determinate condizioni per la persona malata che ne faccia richiesta che devono essere verificate dal Servizio Sanitario Nazionale.

Il Servizio Sanitario però non garantisce tempi certi per effettuare le verifiche e rispondere alle persone malate che hanno diritto di porre fine alla propria vita. Per questo motivo, nel rispetto delle competenze regionali, l’Associazione Luca Coscioni ha promosso a livello nazionale la campagna “Liberi Subito” con raccolta firme per proposte di legge regionali che garantiscano il percorso di richiesta di suicidio medicalmente assistito e i controlli necessari in tempi certi, adeguati e definiti.

➡ Per conoscere lo stato dell’arte delle singole iniziative CLICCA QUI


L'articolo In Valle d’Aosta comincia domani la discussione su “Liberi Subito” proviene da Associazione Luca Coscioni.



#NotiziePerLaScuola
È disponibile il nuovo numero della newsletter del Ministero dell’Istruzione e del Merito.
🔶 #Valditara: "Assumeremo oltre 54 mila #docenti per il prossimo anno scolastico".


Il Codice di Camaldoli, dalla newsletter "La buona storia" di Andrea Bosio

L’incontro di un gruppo di intellettuali dell’area cattolica, estranei al fascismo, si svolse nel monastero di Camaldoli (Ar) dal 18 al 24 luglio.
La riunione, presentata come una delle molte “settimane teologiche”, era stata organizzata da un gruppo di laici impegnati nel settore economico, in particolare Sergio Paronetto e Pasquale Saraceno, coordinati da Adriano Bernareggi, vescovo di Bergamo.
Il dibattito avrebbe portato, nel giro di due anni, alla stesura di un documento: "Per la comunità cristiana. Principi dell’ordinamento sociale, a cura di un gruppo di studiosi amici di Camaldoli".
Con questo titolo raggiunse le stampe nell’aprile del 1945 il testo che oggi è ricordato come "Codice di Camaldoli".

#codicedicamaldoli

@Storia

Storia reshared this.



Ormai non hanno più argomenti sono disperati, se l'UE è un disastro e la VDL è odiata, la colpa è di Putin.
Le comiche finali



FREEDOM FLOTILLA. La Handala fa rotta su Gaza


@Notizie dall'Italia e dal mondo
La nave prende il nome da "Handala", il celebre bambino dei fumetti palestinesi creato da Naji al-Ali: un rifugiato scalzo, che volta le spalle all’ingiustizia. La testimonianza video di Antonio Mazzeo
L'articolo FREEDOM pagineesteri.it/2025/07/21/med…