Salta al contenuto principale



Smartphone Hackability, or, A Pocket Computer That Isn’t


Smartphones boggle my mind a whole lot – they’re pocket computers, with heaps of power to spare, and yet they feel like the furthest from it. As far as personal computers go, smartphones are surprisingly user-hostile.

In the last year’s time, even my YouTube recommendations are full of people, mostly millennials, talking about technology these days being uninspiring. In many of those videos, people will talk about phones and the ecosystems that they create, and even if they mostly talk about the symptoms rather than root causes, the overall mood is pretty clear – tech got bland, even the kinds of pocket tech you’d consider marvellous in abstract. It goes deeper than cell phones all looking alike, though. They all behave alike, to our detriment.

A thought-provoking exercise is to try to compare smartphone development timelines to those of home PCs, and see just in which ways the timelines diverged, which forces acted upon which aspect of the tech at what points, and how that impacted the alienation people feel when interacting with either of these devices long-term. You’ll see some major trends – lack of standardization through proprietary technology calling the shots, stifling of innovation both knowingly and unknowingly, and finance-first development as opposed to long-term investments.

Let’s start with a fun aspect, and that is hackability. It’s not perceived to be a significant driver of change, but I do believe it to be severely decreasing chances of regular people tinkering with their phones to any amount of success. In other words, if you can’t hack it in small ways, you can’t really make it yours.

Can’t Tinker, Don’t Own


In order to tinker with your personal computer, you need just that, the computer itself. Generally, you need a whole another computer to hack on your smartphone; sometimes you even need a custom cable, and it’s not rare you can’t do it at all. Phone tinkering is a path you explicitly set out to do, whereas computer-based hacking is something you can do idly.
A Nokia N900 in hands of a user (by Victorgrigas, CC BY-SA 3.0)
There’s good reasons for this, of course – first, a phone was generally always a “subservient” device not meant or able to be used as a development bench unto itself. Then – phones started really growing in an age and an environment where proprietary technology reigned supreme, with NDAs and utter secrecy (particularly for GSM modems with their inordinate amount of IP) being an especially prominent fixture in the industries surrounding phones. Even Android’s open-source technology was mostly for manufacturers’ benefit rather than a design advantage for users, as demonstrated by the ever-worsening non-open-source driver situation.

Only a few phones ever bucked these trends, and those that did, developed pretty devoted followings if the hardware was worthwhile. Just look at the Nokia N900 with its hardware capability and alt OS support combo, Pixel phones with their mainline kernel support letting alternative OSes flourish, or old keypad Motorolas with leaked baseband+OS source code. They’re remembered pretty fondly, and it’s because they facilitated hacking, on-device or even off-device.

Hacking starts by probing at a device’s inner workings, deducing how things work, and testing the boundaries, but it doesn’t happen when boundaries are well-protected and hidden away from your eyes. A typical app, even on Android, is surprisingly non-explorable, and unlike with PCs, again, if you want to explore it, you need a whole another device. Does it benefit app developers? For sure. I also have a strong hunch it doesn’t benefit users that we could otherwise see become developers.

Part of it is the need to provide a polished user experience, a respectable standard to have, especially so for producing pocket computers to be used by millions of people at once. However, I’d argue that modern phones are suffocating, and that the lack of transparency is more akin to encasing an already reliable device in epoxy for no reason. A device designed to never ever challenge you, is a device that can’t help you grow, and it’s not really a device you can grow attached to, either.

Of course, complaints are one thing, and actionable suggestions is another.

What Do?


If I were asked how to fix this, I wouldn’t limit myself to opening filesystems back up to a user’s exploration habits, beyond the way they were open even in early Android days. I think modern phones could use a pre-installed Python interpreter, with a healthy amount of graphics libraries, a decent amount of control over the system, snappy well-configured autocomplete, and a library of example scripts you could edit in place; essentially, an Arduino IDE-like environment.

In other words, let people easily program phones to flash the screen every time an SMS from a specific person is received, or start audio recording when the user taps the touchscreen three times as the phone’s locked, or send accelerometer movements into a network socket as fast as the OS can receive them. Then, let them wrap those programs into apps, share apps easily with each other, and, since the trend of fast obsolescence requires regular collectie infusions of cash, transfer them from phone to phone quickly.

By the way, if days of Bluetooth and IrDA transfers evaded you, you missed out. We used to stand next to each other and transfer things from one phone to another, a field previously handled, but nowadays these things are somehow relegated to proprietary technologies like Airdrop. This isn’t a problem for personal computers, in fact, they somehow keep getting better and better at it; just recently, I transferred some movies between two laptops using a Thunderbolt cable during a flight, and somehow, this was one of the few “wow” moments that I’ve had recently with consumer-grade tech.

The idea is pretty simple on its own – if phones are to be personal computers, they should be very easy to program.

The Doohickey Port


What about a bonus suggestion, for hardware customization? USB-C ports are really cool and powerful, but they’re relatively bespoke, and you only ever get one, to be unplugged every time you need to charge or sync. Plus, even if you have OTG, all that 5V step-up action isn’t great for the battery, and neither are USB hardware/firmware stacks.

I like I2C. Do you like I2C? I know most of you do. I enjoy I2C a lot, and I like how it’s decently well standardized, to the point things tend to just work. It’s not as great at as many things as USB can be, but it’s also comparably low-frills, you don’t need a software stack or a hefty bespoke board. For the most part, with I2C, you can just send bytes back and forth. It’s a low-bandwidth yet high-impact bus, with a healthy amount of devices you can attach to it. Also, CPUs tend to have plenty of I2C ports to go around, often leaving a good few to spare.

What else? Keeping up with the times, these days, you can manufacture flex PCBs decently quickly, with stiffener at no extra cost, and for dirt cheap, too. On a physical level, phones tend to come with cases, overwhelmingly so. In a way, there’s suddenly plenty of free space on the back of a phone, for those with the eyes to see, and that’s after accounting for the ever-increasing camera bump, too.

My bonus idea to make phones more customizable at low entry level, would be an I2C accessory port. In effect, a latch-less FFC socket with exposed I2C, and some 3.3V at non-negligible power. Of course, protect all lines electrically, current-limit the 3.3V and make its power switchable. With modern tech, you don’t need to compromise waterproofing, either, and you can add a whole bunch of protection to such a port.

From there, you can get GPIOs, you can get PWM, and so much more. You could have a reasonably simple GPIO expansion, but also a fully-fledged board with DACs and ADCs bolted on, or a servo control board, or an extra display of the kind phone designers like to add once in a generation, only to find it never be used by third-party apps as sales numbers never really reach the point of wider adoption. Experimental chording keyboards, touch surfaces, thermal pixel sensors,

Does it feel like you’ve seen that implemented? Of course, this resembles the PinePhone addon scheme, with FPCs wedged between the back cover and a set of pogo pins. Notably though, this kind of standard is about having compatibility between models and even manufacturers. You also shed a lot of Bluetooth cruft generally required when developing accessories for modern phones. It requires a flex PCB, sure, but so do pogopin schemes, and there’s barely any mechanics compared to a pogopin array. Is it more fragile than a pogopin array? Yes, but it’s fragile addon-side, not as much phone-side, whereas pogopin arrays tend to be the opposite.

A Sketch And A Dream


Of course, this also relies on the aforementioned Python interpreter, and a decent exposed I2C API. If the only way to tinker with yours and others’ accessories is through bespoke intransparent apps you need a whole different device to make (or modify, if you’re lucky), the hackability aspect wanes quick. In essence, what I’m proposing is a phone-contained sandbox, not in a security sense, but in an educational sense. Personal computers have been serving as sandboxes for decades now, and yet, phones could never really fulfill such a niche.

I think one of the big problems with modern phones is that a phone is barely ever a sandbox, all for mostly historic reasons. Now, if that’s the case, we should make it one. If it’s a sandbox, then it can be molded to your needs through hacking and tinkering. If it can be molded to your needs, then it belongs to you in a whole different way. Will this happen? Quite unlikely, though, I do feel like making some prototypes. Instead, it’s about highlighting a significant aspect that contributes to tech alienation, and imagining how we could solve it given enough market buy-in.


hackaday.com/2025/08/11/smartp…



Nuova falla in 7-Zip: link simbolici trasformano un’estrazione in un hack


Una falla di sicurezza recentemente individuata nel noto software per la compressione di file 7-Zip ha destato considerevoli timori all’interno della comunità dedicata alla sicurezza informatica. Tutte le versioni di 7-Zip antecedenti alla 25.01 sono interessate da tale vulnerabilità, la quale scaturisce da una gestione non appropriata dei collegamenti simbolici nel corso dell’estrazione dei file.

Si trattaCVE-2025-55188, scoperto e segnalato dal ricercatore di sicurezza Landon il 9 agosto 2025, consente agli aggressori di eseguire scritture arbitrarie di file durante l’estrazione dell’archivio, portando potenzialmente all’esecuzione di codice su sistemi vulnerabili. Quando gli utenti estraggono un archivio creato in modo dannoso contenente link simbolici non sicuri, 7-Zip segue questi link durante l’estrazione, consentendo agli aggressori di scrivere file in posizioni esterne alla directory di estrazione prevista.

La vulnerabilità sfrutta il meccanismo di elaborazione dei link simbolici di 7-Zip. Secondo l’avviso di sicurezza, l’attacco richiede condizioni specifiche per avere successo. Una volta soddisfatte queste condizioni, gli aggressori possono creare archivi dannosi contenenti link simbolici che puntano a file di sistema sensibili. Una volta estratti, 7-Zip segue questi link simbolici, consentendo agli aggressori di sovrascrivere file critici come chiavi SSH, file .bashrc o altre configurazioni di sistema.

Per i sistemi Linux, gli aggressori necessitano che l’obiettivo utilizzi una versione vulnerabile di 7-Zip durante l’estrazione di un formato di archivio che supporti i link simbolici, come file ZIP, TAR, 7Z o RAR. Il processo di sfruttamento è più semplice negli ambienti Linux. Sui sistemi Windows, è necessario soddisfare requisiti aggiuntivi per uno sfruttamento efficace. Il processo di estrazione 7-Zip deve disporre di privilegi elevati o operare in modalità sviluppatore Windows per creare collegamenti simbolici. Questo rende i sistemi Windows meno vulnerabili, ma non immuni all’attacco.

Nonostante abbia ricevuto un punteggio CVSS di 2,7, che lo classifica come di bassa gravità, gli esperti di sicurezza avvertono che l’impatto pratico potrebbe essere molto più significativo. La vulnerabilità consente agli aggressori di ottenere accessi non autorizzati ed eseguire codice prendendo di mira file sensibili che controllano il comportamento del sistema. La vulnerabilità è particolarmente preoccupante perché 7-Zip visualizza i percorsi dei file prima della risoluzione del collegamento simbolico, consentendo agli aggressori di nascondere la vera destinazione delle loro scritture dannose.

La versione 25.01 di 7-Zip, rilasciata il 3 agosto 2025, risolve questa vulnerabilità con una gestione avanzata dei link simbolici. L’aggiornamento include significativi miglioramenti alla sicurezza per impedire la creazione di link simbolici non sicuri durante l’estrazione degli archivi.

L'articolo Nuova falla in 7-Zip: link simbolici trasformano un’estrazione in un hack proviene da il blog della sicurezza informatica.




Quanto alle famiglie con bambini disabili “in situazione di gravità accertata”, si dispone che “i genitori, alternativamente, hanno diritto ogni mese a tre giorni di permesso retribuito, fruibili anche in modo continuativo, a condizione che il bambin…


Cinque giorni di permesso retribuito per i dipendenti vaticani in occasione della nascita di un figlio; tre giorni ogni mese di permesso retribuito per i genitori di figli disabili.



#NoiSiamoLeScuole, con i fondi del #PNRR finalizzati alla costruzione di nuove scuole sono stati demoliti e sono in corso di ricostruzione due istituti in Sicilia e uno in Lombardia.


The AI summit bandwagon heads to India


The AI summit bandwagon heads to India
IT'S MONDAY, AND THIS IS DIGITAL POLITICS. I'm Mark Scott, and I'm having some serious FOMO about missing out on the Oasis reunion concerts touring the United Kingdom. In honor of that, I give you this banger.

— Everything you need to know about the upcoming AI Impact Summit to be hosted by India early next year.

— Ahead of Donald Trump's meeting with Vladimir Putin on Aug. 15, Russia's state-based media is in a full-court propaganda press.

— Who's who in the recent shake-up in the European Commission's Directorate-General for Communications Networks, Content and Technology.

Let's get started:



digitalpolitics.co/newsletter0…



Don’t say this DIY Diskette was a Flop


Sometimes, you build a thing because you need a thing. Sometimes, you do it just to see if you can. This project is in category two: [polymatt] didn’t need to create a floppy disk from scratch-– plenty of old disks still exist– but we’re glad he made the attempt because it makes for a fascinating video that’s embedded below.

Some of you are going to quibble with the terminology [polymatt] uses in this video: first of all, he didn’t begin by creating the universe, so is he really starting “from scratch”? Secondly, the “floppy” format he’s attempting to copy is a 3½” diskette, which does not flop at all. Alas, the vernacular has decided that “stiffy” means something totally different that you ought not to hand a co-worker, and “floppy” is the word in use now.

Choosing newer stiff-walled medium does allow him to practice his CNC skills and make the coolest-looking floppy enclosure we’ve ever seen. (It turns out brushed aluminum is even cooler-looking than the translucent neon ones.) On the other hand, we can’t help but wonder if a lower-density format 5¼” disk might have been an easier hurdle to jump. The diskette that was built does magnetize, but it can’t read or write actual files. We wonder if the older format might have been more forgiving of grain size and composition of his ferrite coating. Even more forgiving still would be to use these techniques to make magnetic tape which is a perfectly viable way to store data.

Instead of storing data, you could make your own cleaning floppy. It’s not like data storage was really the point here, anyway– its not the destination, but the journey. So whatever you call this DIY diskette, please don’t call it a flop.

Thanks to [Anonymous] for the stiff tip! If you want to slip us your tip, rest assured we will grab on and milk it for all it is worth to our readers.

youtube.com/embed/TBiFGhnXsh8?…


hackaday.com/2025/08/11/dont-s…



se lo dice israele ci sarà proprio da crederci che fosse un terrorista... specchiata onestà. poveretto e poveretti.


The Trials Of Trying To Build An Automatic Filament Changer


Running out of filament mid-print is a surefire way to ruin your parts and waste a lot of time. [LayerLab] was sick of having this problem, and so sought to find a proper solution. Unfortunately, between off-the-shelf solutions and homebrew attempts, he was unable to solve the problem to his satisfaction.

[LayerLab] had a simple desire. He wanted his printer to swap to a second spool of filament when the first one runs out, without ruining or otherwise marring the print. It sounds simple, but the reality is more complicated. As an Australian, he couldn’t access anything from InfinityFlow, so he first attempted to use the “auto refill” features included on the Bambu Labs AMS 2. However, it would routinely make filament changes in outside wall areas of a print, leaving unsightly marks and producing poorer quality parts.

His next effort was to use the Wisepro Auto Refill Filament Buffer. It’s a feeder device that takes filament from two spools, and starts feeding the backup spool in to your printer when the primary spool runs out. Unfortunately, [LayerLab] had a cavalcade of issues with the device. It would routinely feed from the secondary spool when there was still primary filament available, jamming the device, and it didn’t come with a proper mounting solution to work with consumer printers. It also had bearings popping out the top of the housing. Attempts to rework the device into a larger twin-spool rig helped somewhat, but ultimately the unreliability of the Wisepro when changing from one spool to another meant it wasn’t fit for purpose. Its feeder motors were also to trigger the filament snag cutters that [LayerLab] had included in his design.

Ultimately, the problem remains unsolved for [LayerLab]. They learned a lot along the way, mostly about what not to do, but they’re still hunting for a viable automatic filament changer solution that suits their needs. Filament sensors help, but can only do so much. If you reckon you know the answer, or a good way forward, share your thoughts in the comments. Video after the break.

youtube.com/embed/zvCZANVXaKw?…


hackaday.com/2025/08/11/the-tr…



Nell’anno giubilare il movimento Shalom, che ha sede a San Miniato (Pisa), realizzerà un panificio sociale nella Repubblica democratica del Congo, nella città di Butembo.


a volte chi vede invadere una nazione libera, può stranamente pensare che si tratti dell'invasione di una nazione libera... non credo che in nazismo c'entri molto. ma poi, da nazione libera, non ho neppure capito cosa dovrebbe fregare alla russia anche se l'ucraina fosse nazista. la russia ha invaso l'iran per quello che fa alle donne? o l'afganistan? il mondo è pieno di stati merda con il sostegno della russia.


quando tra gli strumenti della diplomazia internazionale diventa ricorrente l'uso dell'offesa e della parolaccia, diretta o indiretta, diventa arduo definire la parola come lo strumento non violento da usare per dirimere le controversie internazionali.


M.O, Ruotolo: altri giornalisti uccisi. E’ tempo di agire


@Giornalismo e disordine informativo
articolo21.org/2025/08/m-o-ruo…
“Vogliamo dare un nome e un cognome alle ultime vittime dell’esercito israeliano nella Striscia di Gaza. Si tratta di una troupe di Al Jazeera che secondo le autorita’ israeliane facevano parte di Hamas. Si



Terre rare, gli Usa puntano a estrarle e raffinarle in casa. Ecco come

@Notizie dall'Italia e dal mondo

Il rafforzamento dell’ecosistema della Difesa Usa non passa solamente per l’assegnazione di nuove commesse, ma anche dal consolidamento di una filiera interamente radicata sul territorio nazionale. Il Dipartimento della Difesa statunitense ha infatti concesso il primo prestito



Heatmiser – Mic City Songs
freezonemagazine.com/articoli/…
La ripubblicazione di un album, a mio avviso fondamentale nella definizione delle coordinate di quello che è l’Indie Rock oggi, partendo proprio da quello che è stato, è un evento che non andrebbe sottovalutato da chi ama “perdersi” nei meandri di un genere, sì conosciuto, ma che, per dimensioni, scelte di pubblicazioni, spesso difficilissime da […]
L'articolo Heatmiser – Mic City Songs proviene
La



GLOBAL SUMUD FLOTILLA. A fine agosto e inizio settembre decine di imbarcazioni salperanno per Gaza


@Notizie dall'Italia e dal mondo
Prima dalla Spagna e poi dal Nordafrica gli attivisti di 44 paesi proveranno a rompere il blocco navale israeliano di Gaza e a portare aiuti umanitari ai civili palestinesi. A bordo ci sarà ancora Greta



Gaza, uccisi cinque giornalisti di Al Jazeera


@Giornalismo e disordine informativo
articolo21.org/2025/08/gaza-uc…
Si accentua il massacro dei giornalisti palestinesi. Ora che il gabinetto di guerra israeliano ha deciso autocraticamente, ed in spregio alla comunità internazionale che ora si risveglia da un lungo sonno, di invadere ed occupare Gaza City



Pace tra Armenia e Azerbaigian. Il passo falso di Mosca e i timori dell’Iran


@Notizie dall'Italia e dal mondo
L'intesa firmata a Washington favorisce l'Azerbaigian, la Turchia e gli Stati Uniti, che rimettono piede nel cortile di casa russo. Teheran teme e denuncia la manovra a tenaglia
L'articolo Pace tra Armenia e Azerbaigian. Il passo falso di Mosca e i timori dell’Iran proviene da Pagine



Gaza: fine e rinascita del giornalismo


@Giornalismo e disordine informativo
articolo21.org/2025/08/gaza-fi…
Anas Jamal Mahmoud al-Sharif: questo il suo nome. Aveva ventott’anni, era nato nel campo profughi di Jabalia e si era specializzato nella comunicazione per mass media, lavorava per Al Jazeera Arabic ed era la voce principale da Gaza. È stato assassinato



Israele ha ucciso l'intera troupe di Al Jazeera a Gaza City, inclusi giornalisti e cameraman:

Reporter: Anas Al-Sharif
Reporter: Muhammad Qariqa
Cameraman: Ibrahim Zahir
Cameraman: Moamen Aliwa
Autista: Muhammad Nofal

Gazzetta del Cadavere reshared this.



Vendo due Pilette lavabo 1"1/4 in ABS – nuove, compatibili universali - Questo è un post automatico da FediMercatino.it

Prezzo: 7 Euro

Vendo due Pilette lavabo 1"1/4 in ABS – nuove, compatibili universali

💡 Caratteristiche tecniche:

Materiale: ABS, resistente agli urti e alla corrosione

Diametro: 1"1/4 (standard per lavabi domestici)

Finitura: bianca

Marca: Sensea

Compatibilità: universale per lavabi bagno e bidet con foro standard

Condizione: nuove, mai montate, ancora imballate, complete di aste saltarello.

📦 Prezzo: € 7.00 per entrambe

📍 Disponibilità: ritiro a mano a Palermo o spedizione in tutta Italia (spese a carico

🔗 Link su FediMercatino.it per rispondere all'annuncio

@Il Mercatino del Fediverso 💵♻️





Gaza: la soluzione finale


@Giornalismo e disordine informativo
articolo21.org/2025/08/gaza-so…
Non dobbiamo avere paura delle parole quando queste descrivono la realtà dei fatti. Non dobbiamo avere paura di usare la parola “genocidio” per la strage senza fine di Gaza. Perché è genocidio ciò che Israele ha messo in atto. Lo dicono gli articoli della





La nostalgia del corpo sonoro: isolamento sociale e comunicazioni di massa


Pubblicato in origine su Transform Italia il 30 Luglio 2025 di P. Nicolosi In un libro uscito nel 1977 e intitolato Per una storia dei bisogni l’eclettico, imprevedibile e geniale teologo austriaco Ivan Illich scriveva: «Cinquant’anni fa, quasi tutte le … Continua a leggere→


Mio racconto brevissimo scritto per Minuti Contati, link originale.

Pecunia non olet

Adam entrò in ufficio, appese il soprabito e si accostò al mobile bar per un drink.
«Non dovresti bere nelle tue condizioni» disse una voce calda alle sue spalle.
Si voltò di scatto: c’era una ragazza bionda in un elegante tubino bianco sul divano. Sorrideva.
«Come sei entrata? Chi sei?»
«È inutile agitarsi, vado dove voglio e di nomi ne ho tanti. Sono qui per un affare.»
Lui tirò fuori il cellulare e chiamò la sicurezza, il telefono rimase muto.
«Dovresti ascoltarmi» commentò la donna.
Adam fece per andare verso la porta ma si bloccò, non c’era nessuna porta. Lei si alzò, aveva un corpo da mozzare il fiato.
«Chi diavolo sei?» chiese confuso.
Lei rise divertita: «L’hai detto. Mettiti comodo e ascolta la mia proposta.» Lo spinse sulla vicina poltrona.
«Tu sei ricco Adam, uno dei più ricchi del mondo, eppure non ti servirà, tra poco morrai e perderai ogni cosa.»
«Lo so questo, è il nostro destino.»
«Non proprio. Dovrai morire, lo ammetto, ma in quanto al denaro, ti offro la possibilità di portarne parte con te nell’aldilà.»
Adam rise forte: «Vorrai dire all’inferno!»
«Ah, l’inferno, sei così sicuro di meritarlo?»
«Ci puoi giurare» rispose ridendo «quello mi tocca di sicuro.»
La donna sorrise: «Inferno, paradiso, sono solo parole, il luogo dove finirai non è troppo diverso da questo: meglio essere ricchi che altrimenti.» Sollevò la gonna e si sedette sulla scrivania. «La mia offerta è questa: lascerai la somma che vorrai a una fondazione che io ti indicherò, in questo mondo, e noi te ne faremo avere un decimo nell’aldilà.»
«E tu credi che io abbocchi a un’imbroglio del genere? Proprio io?»
Lei gli mise in mano un biglietto. «I dati per la donazione, pensaci, non tutti hanno questa possibilità.» Lui abbassò lo sguardo per leggerlo, quando lo rialzò la donna non c’era più.
«Cavolo…» mormorò, ma andò a riporlo nel soprabito. Quando si voltò in mezzo alla stanza c’era un’altra donna, bruna, sui quaranta, con un tailleur scuro molto elegante e sobrio.
«Non ti fidare di quella, ti frega» disse la nuova arrivata.
Adam si guardò intorno, forse era il cancro a causargli quelle allucinazioni. Gli restava poco.
«Certo che non mi fido, non si portano soldi all’inferno.»
«Bravo!» esclamò lei soddisfatta. «Devi farle con la gente giusta queste cose. Se ti affidi a noi, non solo garantiamo un trasferimento di denaro doppio, ma assicuriamo anche il passaggio in paradiso.»
«Cosa?»
«Ma certo! Perché con la donazione giusta, con un gesto di generosità vera, noi possiamo assicurarti il perdono.»
«Il perdono?»
«Assicurato!»
Adam sentiva la testa pulsare, non stava affatto bene.
«Questo non è corretto» il grido veniva dalle sue spalle, si girò, era di nuovo la bionda. Furiosa.
«Gli affari sono affari» ribatté la bruna.
Le due si presero per i capelli.
Adam quasi sorrise vedendole avvinghiate, non era più sicuro di quale delle due fosse il demone e quale l’angelo.
Non ha importanza, in ogni caso è troppo tardi – pensò, con un filo di rimpianto, mentre spirava.

reshared this




Qualcuno ha visto il PD?


Quel partito ha la caratteristica di riuscire a sparire completamente dalla scena per mesi, per anni, tra un'elezione (persa) e l'altra.

O governa, e sappiamo come, o sparisce completamente dalla circolazione.

Unknown parent

friendica (DFRN) - Collegamento all'originale
Max 🇪🇺🇮🇹

@Otttoz

Beh immagino che chi non ha votato PD si stia godendo i nipotini del duce esattamente come chi ha votato il PD si sarà goduto il suo supporto agli stupratori della guardia costiera libica, il suo jobs act, la sua delegittimazione delle ONG che salvano vite in mare, ecc.

Però quelli del PD in effetti alla manifestazione del 25 aprile partecipano convintamente, cantano "bella ciao" quindi posso capire che qualcuno li consideri migliori di quegli altri.

Comunque la mia domanda era: ma questi "migliori" dove sono finiti? Che fanno? Stanno aspettando le prossime elezioni per tornare a riproporsi come quelli che vanno votati perché gli altri sono peggiori?




"Soltanto il 35,5% delle persone intervistate ha detto di essere «preoccupata» dalla situazione umanitaria a Gaza, mentre il 61,5% ha detto di non esserlo per niente, o solo in minima parte. L’80% ha detto di ritenere che l’IDF sia un esercito «morale»".


La manifestazione a Tel Aviv contro il piano per occupare la città di Gaza - Il Post
https://www.ilpost.it/2025/08/10/tel-aviv-protesta-occupazione-gaza-netanyahu/?utm_source=flipboard&utm_medium=activitypub

Pubblicato su News @news-ilPost


reshared this

in reply to RFanciola

@RFanciola @il Post

Solitamente i genocidi vengono perpetrati dalle dittature, che hanno sotto controllo l'informazione, e i cittadini di quei stati possono dire "non sapevamo".

Gli israeliani sanno per filo e per segno cosa sta facendo il loro governo, non avranno neanche quella scusa.



Ecco come la Cina spende e spande sull’hi-tech

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Il boom di investimenti (senza profitti) della Cina. Estratto dalla rassegna stampa sul canale Telegram di Giuseppe Liturri.

startmag.it/innovazione/ecco-c…



ATTENTI! WHOFI VI IDENTIFICA… SEMPRE

@Informatica (Italy e non Italy 😁)

La identificazione e re-identificazione di una persona (Re-ID), ovvero la capacità di riconoscere la stessa persona attraverso diverse telecamere, inquadrature, angolazioni, o sequenze video è un'attività complessa che può rivelarsi utile sia nella videosorveglianza che nelle applicazioni forensi e di sicurezza. Tuttavia, i

masmg reshared this.



Da virostar a viromasterchef è un attimo. Adesso se la prende anche per le grigliate...🤦🏼‍♂️🤦🏼‍♂️🤦🏼‍♂️🤦🏼‍♂️😫😫😫



Da mesi mangio meloni (della COOP) di tutti i tipi e sono uno più buono dell'altro. Una meraviglia della natura.

Per quanto riguarda le pesche invece sono arrivato alla conclusione che chi le vende deve aver trovato una procedura per rimuoverne completamente il sapore.

Non è possibile che siano una schifezza in qualsiasi momento dell'estate le compri.

Devono aver trovato un processo di desaporificazione con cui estraggono completamente il sapore, magari per usarlo ad altri scopi. Ci faranno degli shampoo forse...

in reply to Max 🇪🇺🇮🇹

prova le pesche bianche schiacciate fiorfiore coop, dure e saporite, come piacciono a me
in reply to Roberta Lazzeri

@Roberta Lazzeri

Quelle bianche non sono le mie preferite ma se mi dici che sanno di pesca lunedì le provo subito 😁



Scientists have discovered the culprit behind sea star wasting disease, the most devastating marine epidemic on record.#theabstract


Billions of Sea Stars Mysteriously Turned to Goo. Now We Know Why.


Welcome back to the Abstract! Here are the studies this week that gave me hope, sent me back in time, and dragged me onto the dance-floor.

First, what’s your favorite cockatoo dance move? To be fully informed in your response, you will need to review the latest literature on innovations in avian choreography. Then: salvation for sea stars, a tooth extraction you’ll actually like, ancient vortex planets, and what to expect when you’re an expecting cockroach.

Everybody do the cockatoo

Lubke, Natasha et al. “Dance behaviour in cockatoos: Implications for cognitive processes and welfare.” PLOS One.

If you play your cards right as a scientist, you can spend all day watching cockatoos dance online and IRL. That’s what one team of researchers figured out, according to a new study that identified 17 cockatoo dance moves previously unknown to science.

“Anecdotally, parrots (Psittaciformes) have been reported to show ‘dancing’ behaviour to music in captivity which has been supported by studies on a few individuals,” said researchers led by Natasha Lubke of Charles Sturt University. “However, to date it remains unclear why parrots show dance behavior in response to music in captivity when birds are not courting or in the absence of any potential sexual partner.” Cockatoos, by the way, are a type of parrot.

It’s worth pursuing this mystery in part because parrots are popular pets and zoo attractions that require environmental enrichment for their welfare while in captivity. Listening to music and dancing could provide much-needed stimulation for these smart, social animals.

To that end, the authors watched dozens of videos of cockatoos on YouTube, TikTok, and Instagram, with search terms like “birds dancing Elvis,” “bird dancing to rap music” and “bird dancing to rock music.” They also played music and podcasts to a group of captive birds—two sulphur crested cockatoos (Cacatua galerita), two Major Mitchell cockatoos (Lophochroa leadbeateri) and two galahs (Eolophus roseicapilla)—housed at Wagga Wagga Zoo in Australia.
Illustration of the 10 most common recorded dance movements. Ethogram descriptors based on Keehn et al. [3] and illustrations by Zenna Lugosi. Image: Lubke et al., 2025, PLOS One, CC-BY 4.0 (creativecommons.org/licenses/b…)
The results expanded the existing database of cockatoo dance moves from classics like headbang, foot-lift, and body roll to include new-wave choreography like jump turn, downward walk, and fluff (wherein “feathers are fluffed” in a “fluffing event” according to the study).

All the birds that the team studied onsite at the zoo also danced at least once to audio playback of the song “The Nights” by Avicii. They even danced when music was not playing, bopping around to silence or to tips from the financial podcast “She’s on the Money.”

“Dance behaviour is perhaps a more common behaviour in cockatoos than previously thought,” the team concluded. “Further research is required to determine the motivational basis for this behaviour in captivity.”

It will be interesting to see what forthcoming studies reveal, but my own prediction is that the motivational basis falls under Lady Gaga’s edict to “Just Dance.”

In other news…

Solving the mystery of what’s killing billions of sea stars

Prentice, Melanie et al. “Vibrio pectenicida strain FHCF-3 is a causative agent of sea star wasting disease.” Nature Ecology and Evolution.

Over the past decade, a devastating illness has killed off billions of sea stars in what is the largest marine epidemic on record. Scientists have finally identified the culprit that causes sea star wasting disease (SSWD) as the bacteria Vibrio pectenicida, which is from the same family that causes cholera in humans (Vibrio cholerae).

Sea stars infected with SSWD form lesions and rapidly disintegrate into goo in mass mortality events that have upended ecosystems on the Pacific coast from Alaska to Mexico. The isolation of the agent involved in these grotesque die-offs will hopefully help restore these vital keystone species.
Hakai Institute research scientist Alyssa Gehman checks on an adult sunflower sea star in the US Geological Survey’s Marrowstone Marine Field Station in Washington State. Image: Kristina Blanchflower/Hakai Institute
“This discovery will enable recovery efforts for sea stars and the ecosystems affected by their decline,” said researchers led by Melanie Prentice of the Hakai Institute and the University of British Columbia.

Psst…you have some ancient atmosphere stuck in your teeth

Feng, Dingsu et al. “Mesozoic atmospheric CO2 concentrations reconstructed from dinosaur tooth enamel.” Proceedings of the National Academy of Sciences.

For the first time, scientists have reconstructed atmospheres that existed more than 100 million years ago by studying the teeth of dinosaurs that breathed in this bygone air.

A team analyzed oxygen remnants preserved in the dental enamel of roughly two dozen dinosaur teeth including sauropods (such as Camarasaurus), theropods (including Tyrannosaurus), and the ornithischian Edmontosaurus (go Oilers). This data enabled them to infer carbon dioxide concentrations of around 1,200 parts per million (ppm) and 750 ppm in the Jurassic and Cretaceous periods, respectively.

This is in line with other findings that have found wild swings in CO2 levels during the dinosaur age, likely due to volcanic activity. Earth’s current atmosphere is about 430 ppm, and is rapidly rising due to human-driven greenhouse gas emissions.
Skull with teeth of a Kaatedocus siberi found at Howe Ranch, Wyoming, USA. Image: © Sauriermuseum Aathal
“Fossil tooth enamel can thus serve as a robust time capsule for ancient air [oxygen] isotope compositions,” said researchers led by Dingsu Feng of the University of Göttingen. “This novel form of analysis can “provide insights into past atmospheric greenhouse gas content and global primary productivity.”

Vortex planets from the dawn of light

Eriksson, Linn E J et al. “Planets and planetesimals at cosmic dawn: Vortices as planetary nurseries.” Monthly Notices of the Royal Astronomical Society

The first planets ever born in the universe may have formed in vortices around ancient stars more than 13.6 billion years ago. These stars were made of light elements, such as hydrogen and helium, but each new generation forged an itty-bit of heavier elements in their bellies that could potentially provide basic planetary building blocks.

By running simulations of this early epoch, known as cosmic dawn, researchers led by Linn E.J. Eriksson of the American Museum of Natural History found that small rocky worlds, on the scale of Mercury or Mars, could coalesce from dust and pebbles trapped in so-called “vortices,” which are like cosmic eddies that form in disks around newborn stars.

As a consequence, this “suggests that vortices could trigger the formation of the first generation of planets and planetesimals in the universe,” the team said.

Congratulations to everyone who had “ancient vortex planets from cosmic dawn” on their bingo card this week.

Wash it all down with a glass of cockroach milk

Frigard, Ronja et al. “Daily activity rhythms, sleep and pregnancy are fundamentally related in the Pacific beetle mimic cockroach, Diploptera punctata.” Journal of Experimental Biology.

We began with cockatoos and we’ll close with cockroaches. Scientists have been bothering sleepy pregnant cockroaches, according to a new study on the Pacific beetle mimic cockroach, which is one of the few insects that produces milk and gives birth to live young.

“To our knowledge, no study has investigated the direct relationship between sleep and pregnancy in invertebrates, which leaves open the questions: do pregnant individuals follow similar sleep and activity patterns to their non-pregnant counterparts, and how important is sleep for successful pregnancy?” said researchers led by Ronja Frigard of the University of Cincinnati.
Biologists found that pregnant cockroaches need more sleep and those that are sleep-deprived have babies that require longer gestation to develop. Image: Andrew Higley
As it turns out, it’s very important! The team disrupted pregnant cockroaches by shaking their containers four times during their sleeping period for weeks on end. While the well-rested control group averaged 70 days for its gestation period, the sleep-deprived group took over 90 days to deliver their young. In addition, “when chronic sleep disturbance occurs, milk protein levels decline, decreasing nutrients available to the embryos during development,” the team concluded.

For those of us who have been woken up at night by the scuttling of cockroaches, this study is our revenge. Enjoy it while you can, because the smart money is on cockroaches outliving us all.

Thanks for reading! See you next week.