Salta al contenuto principale



Lotta alla criminalità organizzata e al degrado ambientale. L'azione dell'Interpol


I gruppi della criminalità organizzata prendono di mira specie protette, come rinoceronti, pangolini e pesci totoaba, per ottenere profitti elevati e bassi rischi.

La criminalità ambientale ha un impatto devastante sul clima, sulla biodiversità e sugli habitat locali, generando centinaia di miliardi di dollari all'anno.

L'unità di sicurezza ambientale dell'INTERPOL, parte della Direzione per la criminalità organizzata, lavora a stretto contatto con i paesi membri e i partner esterni per identificare, tracciare e smantellare queste reti.

Le specie protette, come i rinoceronti e i pesci totoaba, rischiano l'estinzione a causa dell'elevata domanda di prodotti da parte della criminalità organizzata. I criminali utilizzano tecniche sofisticate, come la falsificazione delle etichette di carico e delle dichiarazioni doganali, per contrabbandare merci come legname protetto e animali vivi. L'Operazione Thunder dell'INTERPOL, un'operazione annuale della durata di un mese, ha portato quest'anno al sequestro di migliaia di animali e all'arresto di centinaia di sospettati.

Si tratta di un'operazione su larga scala, condotta a livello globale per combattere il traffico di fauna selvatica e di prodotti forestali. Questa operazione ha coinvolto le forze dell'ordine di molti paesi che hanno collaborato per sequestrare e indagare su casi di traffico illegale di fauna selvatica e prodotti forestali. Il traffico illegale di fauna selvatica è il commercio illegale di animali, piante e loro parti. Include animali come grandi felini, uccelli e rettili, nonché piante e alberi. Il traffico illegale di fauna selvatica può danneggiare l'ambiente, causare l'estinzione di specie e persino alimentare conflitti e instabilità. Il traffico illegale di legname è il commercio illegale di legname e prodotti forestali. Può includere alberi, legname e altri prodotti forestali. Il traffico illegale di legname può danneggiare l'ambiente e contribuire al cambiamento climatico.

Durante l'operazione, le forze dell'ordine hanno collaborato per:

  • Sequestrare fauna selvatica e prodotti forestali, inclusi animali vivi, piante e legname.
  • Indagare su casi di traffico illegale di fauna selvatica e prodotti forestali, incluse attività online e profili di sospetti.
  • Condividere informazioni e intelligence tra loro per costruire un quadro globale di intelligence sul traffico di fauna selvatica e legname.
  • Arrestare e perseguire i presunti trafficanti.


L'operazione ha portato al sequestro di:


  • Oltre 2.200 sequestri di fauna selvatica e prodotti forestali in tutto il mondo
  • Centinaia di migliaia di parti e derivati di animali protetti
  • Migliaia di alberi e piante
  • Armi da fuoco, veicoli e attrezzature per il bracconaggio


Raccolta di intelligence globale

La portata transnazionale unica dell'INTERPOL e l'accesso al più grande database di polizia al mondo consentono all'organizzazione di guidare la lotta globale contro la criminalità organizzata contro la fauna selvatica. I suoi team specializzati condividono informazioni di intelligence e facilitano le indagini tra le forze di polizia nazionali, con conseguente pubblicazione di notifiche viola e rosse per informare i paesi membri su nuovi modus operandi o latitanti ricercati a livello internazionale.

Successo nell'applicazione della legge a livello globale

Una recente notifica rossa (red notice) emessa dall'INTERPOL ha portato all'arresto di una donna ucraina in Thailandia per aver contrabbandato 116 tartarughe protette dalla Tanzania. Dopo essere sfuggita alla cattura in Thailandia, la donna è stata fermata in Bulgaria e infine estradata in Tanzania. L'arresto della sospettata e il ritorno delle tartarughe nel loro paese d'origine dimostrano la portata globale dell'INTERPOL e la sua capacità di coordinare gli sforzi delle forze dell'ordine internazionali per combattere la criminalità transnazionale.

#interpol #wildlifecrime

fabrizio reshared this.



Roblox sotto accusa in Louisiana: un rifugio per i predatori sessuali


Il Procuratore Generale della Louisiana, Liz Murrill, ha intentato una causa contro Roblox, accusando l’azienda di aver permesso che la sua piattaforma diventasse un rifugio per predatori sessuali e distributori di contenuti a tema infantile. La causa sostiene che l’azienda viola le leggi statali non proteggendo adeguatamente gli utenti e non avvertendo i genitori dei rischi.

La causa sostiene che Roblox faciliti la distribuzione di materiale che sfrutta minori e non adotti misure concrete per colmare le lacune. Una delle argomentazioni è stata uno studio in cui una comunità di oltre 3.000 membri registrati è stata sorpresa a scambiare tale materiale e a cercare di estorcere materiale intimo a minori. Inoltre, incidenti reali sono già stati registrati in Louisiana. Ad esempio, nella parrocchia di Livingston, un giocatore di Roblox è stato arrestato per aver pubblicato contenuti proibiti. Per comunicare con gli adolescenti, ha utilizzato un software che modificava la voce per imitare il linguaggio di una ragazza.

Particolare attenzione è rivolta alla verifica dell’età. Roblox utilizza un sistema biometrico che richiede il caricamento di una foto di un documento d’identità, ma non viene attivato per i nuovi account. Secondo la procura, la piattaforma non verifica effettivamente l’età degli utenti e non coinvolge i genitori quando un bambino registra un nuovo profilo o cerca di aggirare le restrizioni.

Murrill ha affermato che l’azienda ha anteposto gli interessi commerciali alla sicurezza dei bambini, trasformando il parco giochi in uno spazio aperto agli abusi, motivo per cui lo Stato ha ritenuto necessario procedere penalmente.

Roblox ha già rilasciato una risposta ufficiale, affermando che le accuse di ignorare deliberatamente le minacce non sono vere. I rappresentanti dell’azienda hanno sottolineato che milioni di utenti utilizzano la piattaforma ogni giorno per giocare, imparare e altre attività costruttive. La dichiarazione afferma che nessuna protezione può essere garantita al 100% e che i trasgressori sono sempre alla ricerca di nuovi modi per aggirarla.

Tuttavia, l’azienda continua a implementare strumenti di rilevamento delle minacce aggiornati e ad aggiungere ulteriori livelli di protezione. Il CEO di Roblox, Dave Bazzucchi, aveva precedentemente esortato i genitori a prestare maggiore attenzione alle scelte di intrattenimento digitale dei propri figli e a prendere decisioni più consapevoli.

L'articolo Roblox sotto accusa in Louisiana: un rifugio per i predatori sessuali proviene da il blog della sicurezza informatica.

reshared this



Roll Your Own SSB Receiver


[Paul Maine] was experimenting with GNU Radio and an RTL-SDR dongle. He created an SSB receiver and, lucky for us, he documented it all in a video you can see below. He walks through how to generate SSB, too. If videos aren’t your thing, you can go back to the blog post from [Gary Schafer] that inspired him to make the video, which is also a wealth of information.

There is a little math — you almost can’t avoid it when talking about this topic. But [Paul] does a good job of explaining it all as painlessly as possible. The intuitive part is simple: An AM signal has most of its power in the carrier and half of what’s left in a redundant sideband. So if you can strip all those parts out and amplify just one sideband, you get better performance.

We love to play with GNU Radio. Sure, the GNU Radio Companion is just a fancy shell over some Python code, but we like how it maps software to blocks like you might use to design a traditional receiver.

If you want to try any of this out and don’t have a sufficient HF antenna or even an HF-capable SDR, no worries. [Paul] thoughtfully recorded some IQ samples off the air into a file. You can play back through your design to test how it works.

If you have never used GNU Radio, starting with audio isn’t a bad way to get your feet wet. That’s how we started our tutorial a decade ago. Still worth working through it if you are trying to get started.

youtube.com/embed/UWKj4QIwM8Q?…


hackaday.com/2025/08/19/roll-y…




Journalism is not terrorism


@Giornalismo e disordine informativo
articolo21.org/2025/08/journal…
Il 10 agosto 2025 a Gaza una tenda allestita di fronte all’ospedale al-Shifa è stata colpita da un raid israeliano. In quella tenda si concentravano i giornalisti che cercavano di raccontare la devastazione quotidiana, con gli strumenti poveri ma necessari della loro professione. Tra loro



Ma la Meloni conosce “Ahi serva Italia” di Dante Alighieri?


@Giornalismo e disordine informativo
articolo21.org/2025/08/ma-la-m…
Dopo Anchorage e, ancor di più, dopo Washington, il grande entusiasmo ancora una volta riaffermato dalla nostra presidente del consiglio per l’onnipotente Trump mi ha riportato alla mente una dolente e



Meloni e la confessione americana contro i giornalisti


@Giornalismo e disordine informativo
articolo21.org/2025/08/meloni-…
L’arcano delle conferenze stampa senza domande nell’era del Governo Meloni è stato svelato dall’oracolo pronunciato dalla stessa premier italiana nel fuorionda al vertice sulla pace in Ucraina. Eccola qui la




Oggi ho scoperto l'estensione "Firefox Multi-Account Containers" e mi sono chiesto come mai io ne sia venuto a conoscenza solo a 56 anni (vi prego, ditemi che l'hanno rilasciata mercoledì scorso...).

Una domanda per essere sicuro di aver capito bene come lavora.

Se io mi facessi due container, ad esempio "Google" (per accedere a GMail e Google Translate) e "foo-bar" (per accedere al sito "www.foo-bar.com") poi sarei tranquillo sul fatto che Google non saprebbe mai cosa abbia letto navigando su "www.foo-bar.com"?

Mi sembra di aver capito che dovrebbe funzionare proprio così.

#firefox

in reply to Max 🇪🇺🇮🇹

@Massimiliano Polito 🇪🇺🇮🇹 @René Seindal c'è l'add-on temporary containers che fa più o meno quello: ti apre un nuovo container ogni volta che apri un sito che non ha un container assegnato


Il Socialismo in America Latina


altrenotizie.org/in-evidenza/1…




2025 One Hertz Challenge: Atomic Decay Clock is Accurate But Not Precise


At this point, atomic clocks are old news. They’ve been quietly keeping our world on schedule for decades now, and have been through several iterations with each generation gaining more accuracy. They generally all work under the same physical principle though — a radio signal stimulates a gas at a specific frequency, and the response of the gas is used to tune the frequency. This yields high accuracy and high precision — the spacing between each “tick” of an atomic clock doesn’t vary by much, and the ticks cumulatively track the time with very little drift.

All of this had [alnwlsn] thinking about whether he could make an “atomic” clock that measures actual radioactive decay, rather than relying on the hyperfine transition states of atoms. Frustratingly, most of the radioactive materials that are readily available have pretty long half-lives — on the order of decades or centuries. Trying to quantify small changes in the energy output of such a sample over the course of seconds or minutes would be impossible, so he decided to focus on the byproduct of decay — the particles being emitted.

He used a microcontroller to count clicks from a Geiger-Müller tube, and used the count to calculate elapsed time by multiplying by a calibration factor (the expected number of clicks per second). While this is wildly inaccurate in the short term (he’s actually used the same system to generate random numbers), over time it smooths out and can provide a meaningful reading. After one year of continuous operation, the counter was only off by about 26 minutes, or 4.4 seconds per day. That’s better than most mechanical wristwatches (though a traditional Rubidium atomic clock would be less than six milliseconds off, and NIST’s Strontium clock would be within 6.67×10-11 seconds).

The end result is a probabilistic radiometric timepiece that has style (he even built a clock face with hands, rather than just displaying the time on an LCD). Better yet, it’s got a status page where you can check on on how it’s running. We’ve seen quite a few atomic clocks over the years, but this one is unique and a great entry into the 2025 One Hertz Challenge.

2025 Hackaday One Hertz Challenge


hackaday.com/2025/08/19/2025-o…




160.000 documenti rubati.


@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/160000/
160.000 (and counting) scansioni integrali ad alta risoluzione di documenti di identità (cie, patenti, passaporti) sono stati rubati da una decina (and counting) di hotel e, in queste ore, sono attivamente sfruttati per ricatti, truffe, furti di identità e altre azioni criminali. Ma



Come funziona una VPN? Ma, soprattutto, serve davvero?


Grazie ad un commento di @ricci ad un altro post ho trovato questo articolo di Dennis Schubert che secondo me vale la mezz'ora che serve per leggerlo (thanks a lot to @Dennis Schubert ).

overengineer.dev/blog/2019/04/…

#VPN



trump... un uomo di pace che sostiene il genocidio palestinese... che originale.
in reply to simona

portare la pace nel mondo con i dazi... come no. pure in paesi poverissimi in africa.


La Lega vuole tacitare il dissenso contro Netanyahu


@Giornalismo e disordine informativo
articolo21.org/2025/08/la-lega…
La lotta contro l’antisemitismo non è solo legittima. È necessaria. Come sono necessarie tutte le battaglie contro ogni razzismo e ogni forma di discriminazione. La proposta di Legge depositata dalla Lega, primo



Food Irradiation Is Not As Bad As It Sounds


Radiation is a bad thing that we don’t want to be exposed to, or so the conventional wisdom goes. We’re most familiar with it in the context of industrial risks and the stories of nuclear disasters that threaten entire cities and contaminate local food chains. It’s certainly not something you’d want anywhere near your dinner, right?

You might then be surprised to find that a great deal of research has been conducted into the process of food irradiation. It’s actually intended to ensure food is safer for human consumption, and has become widely used around the world.

Drop It Like It’s Hot


Food irradiation might sound like a process from an old science fiction movie, but it has a very real and very useful purpose. It’s a reliable way to eliminate pathogens and extend shelf life, with only a few specific drawbacks. Despite being approved by health organizations worldwide and used commercially since the 1950s, it remains one of the most misunderstood technologies in our food system.
The basic concept is simple—radiation can kill pathogens while leaving the food unharmed. Credit: IAEA
The fundamental concept behind food irradiation is simple. Food is exposed to ionizing radiation in controlled doses in order to disrupt the DNA of harmful microorganisms, parasites, and insects. The method is both useful in single serving contexts, such as individual meal rations, as well as in bulk contexts, such as shipping large quantities of wheat. Irradiation can outright kill bacteria in food that’s intended for human consumption, or leave pests unable to reproduce, ensuring a shipment of grain doesn’t carry harmful insects across national borders.

It’s important to note that food irradiation doesn’t make the food itself radioactive. This process doesn’t make food radioactive any more than a chest X-ray makes your body radioactive, since the energy levels involved simply aren’t high enough. The radiation passes through the food, breaking the chemical bonds that make up the genetic material of unwanted organisms. It effectively sterilizes or kills them, ideally without significantly changing the food itself. It also can be used to reduce sprouting of some species like potatoes or onions, and also delay ripening of fruits post-harvest, thanks to its effect on microbes and enzymes that influence these processes.

The concept of food irradiation dates back a long way, far beyond what we would typically call the nuclear age. At the dawn of the 20th century, there was some interest in using then-novel X-rays to deal with pests in food and aid with preservation. A handful of patents were issued, though these had little impact outside the academic realm.

It was only in the years after World War II that things really kicked off in earnest, with the US Army in particular investing a great deal of money to investigate the potential benefits of food irradiation (also known as radurization). With the aid of modern, potent sources of radiation, studies were undertaken at laboratories at the Quartermaster Food and Container Institute, and later at the Natick R&D Command. Much early research focused on meats—specifically beef, poultry, and pork products. A technique was developed which involved cooking food, portioning it, and sealing it in vacuum packs. It would then be frozen and irradiated at a set minimum dose. This process was developed to the point that refrigeration became unnecessary in some cases, and avoided the need to use potentially harmful chemical preservatives in food. These were all highly desirable attributes which promised to improve military logistics.

youtube.com/embed/pe6AKh_tLys?…

Food irradiation eventually spread beyond research and into the mainstream.

The technology would eventually spread beyond military research. By the late 1950s, a German effort was irradiating spices at a commercial level. By 1985, the US Food and Drug Administration had approved irradiation of pork, which became a key target for radurization in order to deal with trichinosis parasites. In time, commercialized methods would be approved in a number of countries to control insects in fruits, vegetables, and bulk foods like legumes and grain, and to prevent sprouting during transport. NASA even began using irradiated foods for space missions in the 1970s, recognizing that traditional food preservation methods aren’t always practical when you’re orbiting Earth. This space-age application highlights one of irradiation’s key advantages—it works without chemicals and eliminates the need for ongoing refrigeration to avoid spoilage. That’s a huge benefit for space missions which can save a great deal of weight by not taking a fridge with them. It also helps astronauts avoid foodborne illnesses, which are incredibly impractical in the confines of a spaceship. Irradiated food has also been used in hospitals to protect immune-compromised patients from another potential source of infection.

How It’s Done

A truck-mounted food irradiator, used in a demonstration tour around the United States in the late 1960s. Credit: US Department of Energy
Three main types of radiation are used commercially to treat food. Gamma rays from cobalt-60 or cesium-137 sources penetrate deeply into food, and it’s possible to use these isotopes to produce uniform and controlled doses of radiation. Cobalt-60 is more commonly used, as it is easier to obtain and can be used with less risks. Isotope sources can’t be switched “off,” so are stored in water pools when not in use to absorb their radiation output. Electron beams, generated by linear accelerators, offer precise control of dosage, but have limited penetration depth into food, limiting their use cases to specific foods. X-rays, produced when high-energy electrons strike a metal target, combine the benefits of both gamma rays and electron beams. They have excellent penetration and can be easily controlled by switching the X-ray source on and off. The choice depends on the specific application, with factors like food density, package size, and required dose uniformity all playing roles. Whatever method is used, there’s generally no real risk of food becoming irradiated. That’s because the X-rays, electron beams, and gamma rays used for irradiation are all below the energy levels that would be required to actually impact the nucleus of the atoms in the food. Instead, they’re only strong enough to break chemical bonds. It is thus important to ensure the irradiation process does not cause harmful changes in whatever material the food is stored in; much research has gone into finding safe materials that are compatible with the irradiation process.
A chamber used for gamma ray food irradiation with cobalt-60. Credit: Swimmaaj
The dosage levels used in food irradiation are carefully calibrated and measured in units in Grays (Gy) or more typically, kiloGrays (kGy). Low doses of 0.1 to 1 kGy can inhibit sprouting in potatoes and onions or delay ripening in fruits. Medium doses of 1 to 10 kGy eliminate insects and reduce pathogenic bacteria. High doses above 10 kGy can sterilize foods for long-term storage or for space-or hospital-based use, though these doses are not as widely used for commercial food products.

By and large, irradiation does not have a major effect on a food’s taste, appearance, or texture. Studies have shown that irradiation can cause some minor changes to food’s nutritional content, as noted by the World Health Organization. However, while irradiation can highly degrade vitamins in a pure solution, in food items, losses are typically on the order of a few percent at most. The losses are often comparable to or less than those from traditional processing methods like canning or freezing. Changes to carbohydrates, proteins, and lipids are usually very limited. The US FDA, World Health Organization, and similar authorities in many countries have approved food irradiation in many contexts, with studies bearing out its overall safety.
The Radura logo is used to mark foods that have been treated with irradiation. Credit: US FDA
In some extreme cases, though, irradiation can cause problems. In 2008, Orijen cat foods were recalled in Australia after the irradiated product was found to be causing illness in cats. This was not a result of any radioactive byproduct. Instead, the issue was that the high dose (>50 kGy) of radiation used had depleted vitamin A content in the food. Since pets are often fed a very limited diet, this led to nutrient deficiencies and the unfortunate deaths of a number of animals prior to being recalled.

The regulatory landscape varies significantly worldwide, both in dose levels and in labelling. While the United States allows irradiation of various foods including spices, fruits, vegetables, grains, and meats, rules mandate that irradiated products are clearly identified. The distinctive radura symbol—a stylized flower in a circle—must appear alongside text stating “treated with radiation” or “treated by irradiation.” Some countries have embraced the technology more fully; others less so. EU countries primarily allow radiation treatments for herbs and spices only, while in Brazil, just about any food may be irradiated to whatever dose deemed necessary, though doses above 10 kGy should have a legitimate technological purpose.

Overall, food irradiation is a a scary-sounding technology that actually makes food a lot safer. It’s not something we think about on the regular, but it has become an important part of the international food supply nonetheless. Where there are pests to prevent and pathogens to quash, irradiation can prove a useful tool to preserve the quality of food and protect those that eat it.


hackaday.com/2025/08/19/food-i…



L'autoritarismo della signora della Garbatella. Alla faccia della democrazia! (Però gli autocrati rimangono Putin e alleati).

Fuorionda di Meloni contro i giornalisti, è polemica | ANSA.it
ansa.it/sito/notizie/politica/…



I chatbot di Meta e Character.AI sono un po’ troppo ambigui con i minori

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Il Texas sta indagando su Meta e Character.AI per l’uso di chatbot promossi come strumenti terapeutici, mentre il Senato Usa ha avviato un’inchiesta su Meta per presunte interazioni



Difesa aerea Ue, così le tecnologie dirompenti possono fare la differenza

@Notizie dall'Italia e dal mondo

I conflitti recenti, dall’Ucraina al Medio Oriente, hanno ampiamente dimostrato la centralità che la difesa aerea ricopre nell’odierno contesto strategico. L’avvento massiccio dei droni — specialmente quelli aerei — è andato ad aggiungere quantità e qualità a una già



The VLF Transformation


People have long been interested in very low frequency (VLF) radio signals. But it used to be you pretty much had to build your own receiver which, luckily, wasn’t as hard as building your own VHF or UHF gear. But there is a problem. These low frequencies have a very long wavelength and, thus, need very large antennas to get any reception. [Electronics Unmessed] says he has an answer.

These days, if you want to explore any part of the radio spectrum, you can probably do it easily with a software-defined radio (SDR). But the antenna is the key part that you are probably lacking. A small antenna will not work well at all. While the video covers a fairly common idea: using a loop antenna, his approach to loops is a bit different using a matching transformer, and he backs his thoughts up with modeling and practical results.

Of course, transformers also introduce loss, but — as always — everything is a trade-off. Running hundreds of feet of wire in your yard or even in a loop is not always a possibility. This antenna looks like it provides good performance and it would be simple to duplicate.

Early radio was VLF. Turns out, VLF may provide an unexpected public service in space.

youtube.com/embed/1x8rcep6mRE?…


hackaday.com/2025/08/19/the-vl…



Il Ministro Giuseppe Valditara, ha firmato il decreto che assegna nuove risorse finanziarie per l’istituzione di posti “in deroga”, per l’anno scolastico 2025/2026, a favore del personale docente e del personale amministrativo, tecnico e ausiliario n…


Chrissie Hynde & Pals presentano Duets Special in uscita a ottobre
freezonemagazine.com/news/chri…
Chrissie Hynde, torna con un progetto inaspettato e calorosamente intimo: Duets Special, pubblicato sotto l’accattivante nome Chrissie Hynde & Pals, in uscita il 17 ottobre 2025 per Parlophone (e Rhino).Questo è il quarto album solista in studio di Hynde e rappresenta una svolta decisiva verso un territorio più tenero e


A 404 Media investigation reveals how the man who started Tea, the ‘women dating safety’ app, tried to hire a female ‘face’ for the company and then hijack her grassroots community.#Features


How Tea’s Founder Convinced Millions of Women to Spill Their Secrets, Then Exposed Them to the World


On March 16, 2023, Paola Sanchez, the founder and administrator of Are We Dating the Same Guy?, a collection of Facebook groups where women share “red flags” about men, received a message from Christianne Burns, then fiancée of Tea CEO and founder Sean Cook.

“We have an app ready to go called ‘Tea - Women’s Dating Community’, that could be a perfect transition for the ‘Are we dating the same guy’ facebook groups since it sounds like those are on their way under… Tea has all the safety measures that Facebook lacked and more to ensure that only women are in the group,” Burns said. “We are looking for a face and founder of the app and because of your experience, we think YOU will be the perfect person! This can be your thing and we are happy to take a step back and let you lead all operations of the product.”

The Tea app, much like the Are We Dating the Same Guy Facebook groups, invites women to join and share red flags about men to help other women avoid them. In order to verify that every person who joined the Tea app was a woman, Tea asked users to upload a picture of their ID or their face. Tea was founded in 2022 but largely flew under the radar until July this year, when it reached the top of the Apple App Store chart, earned glowing coverage in the media, and claimed it had more than 1.6 million users.

Burns’ offer to make Sanchez the “face” of Tea wasn't the first time she had reached out to her, but Sanchez never replied to Burns, despite multiple attempts to recruit her. As it turned out, Tea did not have all the “safety measures” it needed to keep women safe. As 404 Media first reported, Tea users’ images, identifying information, and more than a million private conversations, including some about cheating partners and abortions, were compromised in two separate security breaches in late July. The first of these breaches was immediately abused by a community of misogynists on 4chan to humiliate women whose information was compromised.

A 404 Media investigation now reveals that after Tea failed to recruit Sanchez as the face of the app and adopt the Are We Dating the Same Guy community, Tea shifted tactics to raid those Facebook groups for users. Tea paid influencers to undermine Are We Dating the Same Guy and created competing Facebook groups with nearly identical names. 404 Media also identified a number of seemingly hijacked Facebook accounts that spammed the real Are We Dating The Same Guy groups with links to Tea app.

404 Media’s investigation also discovered a third security breach which exposed the personal data of women who were paid to promote the app.

“Since first creating these [Are We Dating The Same Guy] groups, I have avoided speaking to the media as much as possible because these groups require discretion and privacy in order to operate safely and best protect our members,” Sanchez told 404 Media. “However, recent events have led me to decide to share some concerning practices I’ve witnessed, including messages I received in the past that appear to contradict some of the information currently being presented as fact.”

Burns is no longer with Cook or involved with Tea, and she did not respond to multiple requests for comment. But messages from Burns to Sanchez show that Cook changed his story about why he created Tea after they broke up. 404 Media also talked to a former Tea employee who said she only knew Burns as “Tara,” a persona that also exists in the Tea app and on Facebook as an official representative of the Tea app. This employee said that when Burns left the company, Cook took over the persona and communicated with other Tea users as if he was Tara.

Overall, our reporting shows that while Cook said he built Tea to “protect women,” he repeatedly put them at risk and tried to replace a grassroots movement started by a woman who declined to help him. As one woman who worked for him at Tea told us: “his [Cook’s] motive is money, not actually to protect people.”

Tea did not directly answer a list of specific questions regarding 404 Media’s findings and the facts presented in this article. Instead, it sent us the following statement:

“Building and scaling an app to meet the demand we’ve seen is a complex process. Along the way, we’ve collaborated with many, learned a great deal and continue to improve Tea,” a Tea spokesperson said. “What we know, based on the fact that over 7 million women now use Tea, with over 100,000 new sign ups per day, is that a platform to help women navigate the challenges of online dating has been needed for far too long. As one of the top apps in the U.S. App Store, we are proud of what we’ve built, and know that our mission is more urgent than ever. We remain committed to evolving Tea to meet the needs of our growing community every day.”

How Tea Tried to Recruit a Female “Face” for the App


Sanchez started the first Are We Dating The Same Guy Facebook group in 2022 after her terrible experiences dating. The basic premise—a space for women to share information about men with other women—has existed in various forms before, but Are We Dating The Same Guy quickly became an online phenomenon. Today, Are We Dating The Same Guy is comprised of more than 200 different Facebook groups dedicated to different cities across the U.S. and Canada and has more than 7 million members. The groups have many volunteer moderators, but Sanchez is still the administrator for most of them.

Women in the groups, who can also post anonymously, share a wide range of experiences, from relatively benign complaints about men they didn’t like, to serious accusations of infidelity and physical assault.

The popularity of Are We Dating The Same Guy groups is evidence that its members find them useful, but that popularity has come with a cost. Sanchez has become increasingly cautious after several attempts at retaliation from disgruntled men who are organizing on Telegram to dox women in the group and at least one lawsuit. In that case, a man accused Are We Dating The Same Guy of libel after a user in the Chicago group called him “clingy” and a “psycho.” Sanchez also said she had a rock thrown through the window of her family’s home by a man who wanted to stop Are We Dating The Same Guy, that she pays for a service to wipe her personal information from the internet, and that she generally keeps a low profile. This is the first time she has talked to the press.

By the time she was first approached by Burns in October, 2022, Sanchez was suspicious of Tea’s interest in Are We Dating The Same Guy because of some of the negative attention the groups already got.

“I’m a huge fan of all the work you're doing and I think it will have an ENORMOUS and important benefit on the lives of women,” Burns said in a Facebook message to Sanchez on October 25, 2022. At the time, Burns’ Facebook profile picture was a photo of her and Cook smiling. “My fiance and I have been working on a similar project due to my own dating woes and thought you’d be the perfect person to collaborate with on it.”

This is an entirely different origin story than the one Cook tells about Tea today. On Linkedin, Tea’s site, and interviews, Cook says that he “launched Tea after witnessing his mother’s terrifying experience with online dating—not only being catfished but unknowingly engaging with men who had criminal records.”

Before starting Tea, Cook worked at a couple of tech companies in San Francisco, including Salesforce, where he held a “director” title and rapped and made songs about Salesforce products during presentations he shared on Linkedin.


0:00
/3:59

A video Sean Cook uploaded to Linkedin

There is no mention of Burns on the Tea site, but in 2022 she persistently asked Sanchez to join Tea.

In addition to messaging her on Patreon and Facebook, on December 2, Burns sent Sanchez $25 on Venmo along with a message thanking Sanchez for her work. “Sent you a PM on Facebook re: Business collab when you get a chance! 😊” On December 7, 2022 Burns sent Sanchez $15 on buymeacoffee.com along with a message about a “business opportunity,” and “an app with a similar concept to the facebook groups you manage that I would love to collaborate with you on!”

In April2023, after Sanchez didn’t respond to Tea’s requests, Are We Dating The Same Guy group admins started banning a set of Facebook accounts posting links to the Tea app over and over again. For example, Are We Dating The Same Guy moderators banned one Facebook user named Crystal Lee from 25 groups across the country after the account repeatedly encouraged members to use Tea and suggested that information about the men they’re asking about was available there. Lee’s account was clearly hijacked from a woman with a different name sometime around 2016. While the account name is Crystal Lee, the name in the URL for her page is Kimberly Ritchart. I found Richart’s new Facebook account, where her first post in 2016 says she lost access to her original account. 404 Media couldn’t confirm who was in control of the account, and saw no evidence that Tea was behind it, but activity from similarly hijacked accounts indicate that there was an organized effort to stealthily promote the Tea app in the Are We Dating The Same Guy groups.

Two other Facebook accounts, Norma Warner and Morgan Ward, were banned from 23 groups and five groups respectively for spamming Tea app promotions. Warner and Ward also shared identical replies two weeks apart. “If I remember correctly, I think he’s been posted to Tea. I maybe [sic] mistaking him for someone else but looks pretty familiar,” both replies said in response to different posts in different groups.

Veronica Marz told me she was hired in April 2024 to be Tea’s partnerships manager. Her job was to manage the affiliate program that would pay people $1 per user who signed up to Tea via their unique affiliate link. She also moderated a number of groups named “Are We Dating the Same Guy | Tea App” for different cities, which were started by and owned by the Tea app and could obviously confuse Facebook users. Marz also reached out to admins of the real Are We Dating The Same Guy groups to ask if they’d be willing to join the affiliate program.

While reporting this story, 404 Media discovered that Tea’s data about the affiliate program, including who signed up for it, their real name, how much they have been paid, their emails, phone numbers, Venmo accounts, and charities they wanted to donate to if they didn’t want the money, were left exposed online. All a hacker or other third party had to do to view all of this data was add “/admin” to the public Tea affiliate site’s URL. Tea turned off this site and the affiliate program entirely after 404 Media reached out for comment for this article on August 13.

On December 1, 2024, Marz noticed an account named Nicole Li who was spamming Tea app promotions in one of the Facebook groups she managed for Tea as part of her job. Li was not part of the affiliate program that Marz managed, and unbeknownst to Marz, moderators of the original Are We Dating The Same Guy groups would eventually ban the Li account later. At that point, Marz was reporting directly to Cook, and she flagged the account to him because it was suspicious and spamming several groups at the same time.

“Sean uses that account to communicate directly with users on the app, but people think they are speaking to someone actually named Tara."


“Just wanted to check and see if this person was working with the Tea app?,” Marz said in a text to Cook along with a screenshot of the account seen by 404 Media. “I’ve noticed that they’ve joined all the groups regardless of location and they’ve been promoting the app, but they aren’t a part of the affiliate program that I saw.”

Cook replied: “Not sure what’s going on there but as long as they’re not bothering anyone, I guess let’s just let them do their thing!”

All of the Facebook accounts that spammed Tea promotions were either deactivated or did not respond to our request for comment. None of the accounts were officially part of Tea’s affiliate program, according to the exposed data.

404 Media has seen several messages from Are We Dating the Same Guy Facebook group members and moderators confused about whether the Tea app was the official Are We Dating The Same Guy app, and whether Sanchez was affiliated with it. Several people also wondered if the Tara persona, which reached out to them on Facebook, was associated with Tea or if Sanchez was behind it. One review of the Tea app on the Google Play Store from January, 2024 also seemed confused and disappointed by the app.

“A girl in a FB group referred me (I think she was actually advertising 🤷),” the review said. “She called it a free app. It’s not free [...] The fb groups should have raised MORE THAN ENOUGH to cover app costs that are referred to in other reviews [...] I find this gross. Maybe I’ll come around or be back, but for now I’ll stick with fb.”

Marz also told me that several users in the Tea-owned Facebook groups were confused, and thought that they were in the original Are We Dating The Same Guy groups owned by Sanchez.

“Maybe five to seven people in different groups asked me about Paola Sanchez, and I had to explain to them, like, ‘Hey, this is not Paola’s group. This group is owned by the Tea app,’” she told me. “I had to explain to them the difference between the two.”

Tea’s promotion strategy clearly managed to poach and confuse some members of the Are We Dating The Same Guy community and get them to join the app. Later, its strategy was to undermine Are We Dating The Same Guy directly.

Today, Tea’s website credits an influencer named Daniella Szetela as helping to widely promote Tea: “One day while scrolling, Sean discovered a viral creator, Daniella, whose content resonated with millions of women—and saw an opportunity to bring that same energy to Tea. What began as a simple idea quickly turned into a social media movement.” The site says Cook was so impressed with her voice and following, he made her “Head of Socials.” A March, 2025 archive of the same page on Tea’s site tells the same story, but at the time Szetela’s title was “Chief Female Officer.”

“Together, Sean and Daniella have transformed Tea into more than an app—it’s a movement,” Tea’s site says.

In September 2024 Tea started posting videos to its official TikTok and Instagram accounts named @TheTeaPartyGirls. Some of the videos are of Szetela showing the app and talking about how great it is. Other videos are made to look like they’re coming from other Tea users, but in reality are produced by a company called SG Social Branding, which describes itself as a “Gen Z Creator Powerhouse Delivering Short Form Videos to be used for YOUR Brand’s Paid Social Ads.” According to its site, SG Social Branding has a team of “over 35 gen Z creators” who create videos for clients. These videos are made in the the style of common social media posts, like an influencer talking directly to the camera, doing man on the street interviews, or videos that look like they are clips from podcasts, but are from podcasts that don’t actually exist.

On a “case studies” page for Tea on the SG Social Branding website, the company says that Tea’s “ask” was to “Develop the narrative that Tea is the go to for Women who like to stay safe while dating.”

“We deployed creators for street interviews in locations such as NYC during daytime and the Nightlife scene on college campuses. Additionally, we made entertaining podcast clips of girl talk that is truly un-scrollable,” the case studies page says. Under “results” it says “The TEA app went #1 in the app store on July 23rd, 2025 and is now viral! Videos deployed from SGSB creators crossed over 3.4 million views with over 74k shares and rising.”

In these videos, the influencers don’t only promote Tea and talk about it as if they actually found information on it about men they know, they also repeatedly disparage Are We Dating The Same Guy Facebook groups.

“Instead of using that Facebook group Are We Dating the Same Guy, what girls are doing now because it’s so much easier is they’re downloading Tea,” a woman holding a microphone says as if she’s talking to someone off-camera. The text overlaid on the video says “Tea Party Pod.” The woman, Savannah Isabella, is an influencer who works for SG Social Branding. She goes on to talk about how one of her friends found a guy she was seeing there and all the red flags other women have posted about him. “Miss me with that. Boy bye. And it’s so much easier and faster than that Facebook group.”

View this post on Instagram


A post shared by Tea - Dating Safety App for Women (@theteapartygirls)


In another video, Isabella is at a bar, demoing the Tea app. “Girls, forget about Are We Dating The Same Guy,” she says.

Isabella and SG Social Branding did not respond to a request for comment.

Marz told me that she was hired to Tea by a woman named Tara and that initially she only communicated with Tara. Marz did a Zoom interview with Tara before she started to work for Tea and the woman identified herself as Tara over text and email. In November 2024, Marz said that Tara left the company, at which point she started reporting directly to Cook. When I showed Marz a photograph of Christianne Burns, Cook’s then fiancée, she said that was who she knew as Tara, who first interviewed her over Zoom.

After "Tara" left, Marz said Sean took over the “Tara Tea” account which was used to communicate with Tea users in the app and on Facebook.

“Sean uses that account to communicate directly with users on the app, but people think they are speaking to someone actually named Tara,” she told me. Essentially, a man is posing as a woman to an audience of women who are trying to protect themselves from, at best, deceptive men.

How Tea Deleted Posts About Men


Tori Benitez has a private consulting business for victims of domestic violence who are in Family Court for high conflict divorces or custody battles. She told me she joined the Tea app because it promoted digital safety, talking about abusers, and protecting people by letting them share information anonymously.

“I'm in the dating scene and on dating apps, and have had my own experience, so I first joined as a user, and then I saw them post that they needed help with escalation claims,” she told me. The escalation claims were complaints both from men about what women were posting about them in the app as well as complaints from other users. She thought her experience as a paralegal would be useful, and she could use more remote work, so she sent Tea her information.

“I had a Zoom call with Sean, and he wanted to know not only a little bit about my business and how I help people, but I had to tell my own personal story.” Benitez said. “I had an ex who literally threatened to kill me and told me how he was going to kill me, even after a restraining order. My story is deep and scary, and he kind of interrupted me and started crying. And I was like, ‘Oh, are you okay?’ Looking back, shouldn't I have been the one crying? It's kind of weird.”

Benitez said she took the job because she wanted to help women. During the interview and at several points while working for Tea, Benitez said that Cook wanted to make her consulting business part of Tea. Benitez said Cook floated having a tab in the Tea app that would send women to her consulting business if they needed help, or having her run workshops for users.

“I feel like his [Cook’s] motive is money, not actually to protect people, and I think that his story about his mom is a crock of shit.”


Benitez started working in April of this year but said the job wasn’t what she expected because it made no use of her experience as a paralegal. She said the work was more like customer support, and mainly had her filtering through complaints, responding to them according to a strict script she was given, and keeping a record of the responses.

If a complaint contained words like “defamation” or seemed legally threatening, she would find the post in question and the user who posted it. At times she would contact the user and ask them if the post was true and if they had any evidence to prove it. Sometimes users would respond and say the accusations were true, and the post would remain. Sometimes the users also provided supporting evidence, like court documents. Sometimes the users would delete the posts themselves, or Tea would delete the posts if the users didn’t respond to Benitez’s questions after a certain amount of time.

“That's when things would get deleted and literally no longer exist on there,” she said. “Nobody could find them. They did not go into an archive. They are just poof gone.”

She would record all the complaints and responses in a spreadsheet for Tea’s internal records, but said it didn’t always make sense when Tea decided to delete a public post on the Tea app vs when it decided to leave one up. In one interview in May, 2025, Cook said the Tea app receives “three legal threats a day from men,” and that Tea has a full legal team that helps it manage those situations.

Benitez said that in one case, Cook told her he would handle a complaint from a man regarding what was said about him on the app himself because Cook knew the man personally.

“He [Cook] seemed to side with or randomly choose to delete things that just didn't make sense and felt really concerning to me,” she said. “But I felt I had no room to complain, because every time I brought up a concern his response was either ‘ignore it,’ or ‘I will handle it,’ and there's no HR, so it's not like I can go anywhere to say all this stuff's happening. I didn't have any other point of contact other than him.”

Benitez also said she raised concerns about users’ behavior on the app. She said that at some point earlier this year Tea went viral in one town in Louisiana, where Tea users started going after each other and the number of complaints exploded.

“There was a lot of fighting in the comments between users. There were a lot of threats between users. It just turned into a chat room,” she said. “They would be fighting each other. Like, ‘Where are you at? I’ll pull up on you.’ I was like, ‘holy shit.’ There would be racist posts. It just started getting bad, and I mentioned that to him [Cook] as well, and I basically got the answer of let them say whatever they want. And like this whole like, you know, ‘It's free speech.’ I thought this was about protecting people,” Benitez recalled.

In May, Benitez said Cook was late to pay her. When she asked about it, Cook said he didn’t have the money, and asked her to keep working until he did, or work for less pay. At that point, Benitez said she wouldn’t work until she got paid for the work she already did. Eventually Cook sent her the money for the hours she already worked, but Benitez never came back.

There are currently two class action lawsuits in motion against Tea accusing the company of failing to properly secure users’ private information. After these complaints were filed Tea updated its terms of service, which now require users to waive their right to participate in class actions against the company, and agree to attempt an “informal dispute resolution” before suing the company.

“I feel like his [Cook’s] motive is money, not actually to protect people,” Benitez said, “and I think that his story about his mom is a crock of shit.”

Tea’s Security Breaches Put Users at Risk


On July 25, 404 Media broke the news that Tea made an error that completely exposed a database containing at least 72,000 thousand images from its users, and that a misogynistic 4chan community downloaded them and shared them online in various forms in order to harass and humiliate women. On July 28, 404 Media revealed an even worse security breach to Tea, which exposed more than a million private messages between Tea users that included identifying information and intimate conversations about cheating partners and abortions.

After the first hack, someone created a website modeled after “Facemash,” the site that Facebook CEO Mark Zuckerberg infamously created while he was a student at Harvard to rank the attractiveness of female students at the university. This new site, based on Tea data, took the selfies women uploaded to Tea in order to verify they are women, presented them to visitors in pairs, and allowed them to choose which they believed was more attractive. The site used the votes to create a ranking and also highlighted the list of the 50 most and least attractive women according to votes.

The second breach was far more dangerous not only because the direct messages between Tea users that were exposed included conversations they thought were private about sensitive subjects that could become dangerous in the wrong hands, but also because those conversations included details that could be used to deanonymize users. Direct messages between users often included their real phone numbers, names, and social media handles.

“I posted on the app about a man who groomed and abused me as a minor,” one Tea user whose direct messages were exposed in the second security breach told 404 Media. The user asked to be anonymous because she’s heard about “incel dudes” doxing Tea users. “I joined Tea because I appreciated the premise of a ‘whisper network’ for community safety—because a huge amount of men are, in fact, unsafe individuals, and most of the time those impacted don't find out until it's too late.”

This user added that they felt safe enough to share intimate details on Tea because it was advertised as a “safe space” for women with a strong emphasis on anonymity.

“My reaction to the breach is anger, just anger, and some disgust,” the user said.

Kasra Rahjerdi, the researcher who flagged the second security breach to 404 Media, said there were signs he wasn’t the only person who may have accessed more than a million of private Tea messages. Every Tea user is assigned a unique API key which allows them to interface with the app in order to log in, read public posts, share posts, or do other actions in the app. Rahjerdi discovered that any Tea user was also able to use their own API key to access sensitive parts of the Tea app’s backend, including a database of private messages and the ability to send all Tea users a push notification.

This access also allowed users to create new databases, and Rahjerdi told 404 Media he saw someone else doing just that while he was looking at Tea’s backend. Most of these databases were empty, but one contained a link to a Discord server with a handful of users which shut down shortly after 404 Media tried to join it on July 26. This activity indicates that someone else found the same security breach as Rahjerdi and could have accessed more than a million private messages of Tea users as well.

In a podcast interview in April, 2025, Cook said he doesn’t know how to code, and that the Tea app was built by two developers in Brazil. According to Tea’s Linkedin page, both developers are contractors who are available to hire via Toptal, a platform where software developers offer their labor as remote freelancers. Those two developers did not respond to our request for comment.

Eva Galperin, the director of cybersecurity at the Electronic Frontier Foundation, told 404 Media that the private Tea messages could be especially dangerous to Tea users who talked about abortions or specific men.

“I would be particularly concerned about posts about abortions in say Texas, where SB 8 grants a private right of action to sue anyone who performs or facilitates an abortion that violates the law,” Galperin said. SB 8, also known as the “Texas Heartbeat Act,” bans abortion after the detection of a “fetal heartbeat,” which is usually six weeks into pregnancy. The law also allows anyone to sue anyone else who performs abortions or “aids and abets” performing or inducing an abortion in violation of the law. “I’d also be concerned about DMs containing information of sexual orientation or immigration status, or details about sexual assault that the survivor was sharing in private.”

Galperin said she would be “extremely concerned” if the messages got out, not just because of the men who are named in the messages, but because “There are people who think that anyone who has an account on this platform is fair game for harassment,” referring to some of the harassment we’ve already seen from 4chan.

Despite the risks the Tea app has already put users in, Tea has downplayed the impact of the security breaches, and has continued to grow in popularity. On July 28, Tea said in a post to Instagram that “some” direct messages were accessed as part of the initial incident, and that it had temporarily disabled the ability for users to send direct messages. The statement does not acknowledge that more than a million messages were exposed, and also misleads users that those messages were leaked as part of the initial breach. The messages were exposed in an entirely separate breach around different security issues. On July 26, after 404 Media reported about both Tea breaches, Tea said on Instagram that it received over 2.5 million requests to join the app. The replies from users on Instagram are filled with people who are on the Tea app waiting list to be approved. Again, even after it said it has hired a cybersecurity firm to address the two previously reported breaches, 404 Media found a third security issue that exposed users’ private information that Tea wasn’t aware of until we reached out for comment.

Today, Tea’s site boasts that more than 6.2 million women use the app.

Joseph Cox contributed reporting.




Per porre fine alla guerra in Ucraina, devono vincere tutti. La versione di Caruso

@Notizie dall'Italia e dal mondo

L’arte della diplomazia non consiste solo nel trovare soluzioni tecniche ai conflitti, ma nel costruire narrazioni che permettano a ogni leader di tornare a casa con qualcosa da celebrare davanti ai propri elettori. Questa dinamica, spesso sottovalutata



La US Navy potrebbe selezionare l’M-346 di Leonardo per addestrare i suoi futuri piloti

@Notizie dall'Italia e dal mondo

La Marina statunitense è alla ricerca di un nuovo aereo d’addestramento per sostituire i suoi T-45 Goshawk, ormai arrivati a fine vita operativa. In corsa per questa sfida c’è il Beechcraft M-346N, versione a stelle e strisce del trainer avanzato






Qualche giorno fa ho installato l'app dell'Aeronautica Militare per il meteo.

Confrontando le previsioni con quelle di LaMMA, un consorzio per il meteo di alto dettaglio sulla Toscana, vedo delle previsioni molto diverse già a 24 ore.

Per esempio, domani l'AM dà una massima di 29 gradi e LaMMA di 33.

Possibile che due organizzazioni così importanti facciano previsioni così diverse, già a 24 ore?

#meteo #lamma #am #AeronauticaMilitare



Amnesty. Nuove prove sulla fame a Gaza: “Politica deliberata”


@Notizie dall'Italia e dal mondo
Il rapporto della Ong raccoglie diverse testimonianze sulla combinazione mortale tra fame e malattie, concludendo che non si tratta di un effetto secondario delle operazioni militari ma è il risultato atteso di piani e politiche che Israele ha ideato e attuato, negli ultimi 22 mesi



Addio a Giulia Simi, tra le prime a credere nella necessità di un’associazione radicale per la libertà di ricerca scientifica.

“Con dolore abbiamo appreso della morte di Giulia. Era la mia forza e guida nella battaglia per diffondere nelle regioni le DAT. Uno spirito deciso e forte senza fronzoli né calcoli. che mi dava forza di credere nella libertà di scelta nella vita dei cittadini. Grazie, Giulia, la vita è fatta anche di matematica. Ti ho voluto bene. Mi e ci hai incoraggiati sempre. Grazie!
Sentite condoglianze a Marcello!”
Mina Welby

Giulia Simi, fin dall’arrivo di Luca Coscioni nel mondo radicale gli si affezionò rendendosi da subito disponibile a concorrere alla fondazione dell’Associazione che ancora oggi porta il suo nome.

Iscritta fino al 2025, negli anni Giulia ha ricoperto vari incarichi tra cui quello di vice-segretaria, impegnandosi in particolare nelle iniziative dell’Associazione per la promozione della legalizzazione dell’eutanasia e la promozione del metodo scientifico (anche) in politica.

Un pensiero pieno di riconoscenza per Giulia, per quello che ha fatto per la sua e nostra associazione. Resterà nel cuore di chi l’ha conosciuta.

Filomena Gallo e Marco Cappato

L'articolo Addio a Giulia Simi proviene da Associazione Luca Coscioni.



Questa mattina Papa Leone XIV si è recato in visita privata al Santuario della Madonna delle Grazie alla Mentorella, nella frazione di Guadagnolo di Capranica Prenestina, in diocesi di Palestrina. Lo comunica la Prefettura della Casa pontificia.


Giorgia Meloni alza gli occhi al cielo mentre parla il cancelliere tedesco Merz | VIDEO


@Politica interna, europea e internazionale
Stanno facendo il giro del web le espressioni facciali che la premier Giorgia Meloni ha assunto durante il vertice alla Casa Bianca per la pace in Ucraina, in particolar modo mentre parlava il cancelliere tedesco Fridriech Merz. “Aiuteremo Kiev, ma il cessate il




ho fatto a gemina la seguente domanda:
"è possibile che chi vede nel "riscaldamento globale" anche un effetto utile a causa della recente "apertura" delle rotte artiche, sia presto trombato dai problemi dell'AMOC che possono provocare un raffreddamento dell'europa nord?"

la risposta:
"Sì, la sua osservazione è pertinente e tocca un punto cruciale del dibattito sul cambiamento climatico. Chi vede un vantaggio nell'apertura delle rotte artiche, reso possibile dal riscaldamento globale, potrebbe presto trovarsi a fare i conti con gli impatti negativi di un potenziale indebolimento o collasso della Corrente Meridionale di Ribaltamento Atlantica (AMOC), un sistema di correnti oceaniche di cui fa parte anche la Corrente del Golfo."

in sostanza un'altra trombata per putin.

in reply to simona

beh... non ti è venuto il dubbio che senza la corrente del golfo, visto che napoli è alla stessa latitudine di new york, l'europa sarebbe come il canada? puoi non fidarti di una ai ma il dato rimane quello... chiedi a chi ti pare... ma non a salvini o trump o la meloni. quanto odio i negazionisti.




Vogliamo i colonnelli
freezonemagazine.com/rubriche/…
Era quasi inevitabile, dopo l’episodio su Una vita difficile di Dino Risi, improntare la puntata successiva di Celluloide, su un lavoro del regista “gemello” di Risi, cioè Mario Monicelli; Risi e Monicelli, sono stati, senza ombra di dubbio, non solo due grandi registi, ma per giudizio unanime, i due maggiori autori della cosiddetta commedia all’italiana […]
L'articolo Vogliamo i colonnelli provie
Era quasi


ə-Li 🐝💨💨🍯 reshared this.



molto molto molto interessante


Il fuori onda di Giorgia Meloni con Donald Trump: “Io non voglio mai parlare con la stampa italiana” | VIDEO


@Politica interna, europea e internazionale
Meloni è allergica alla stampa italiana: lo conferma lei stessa in un’imbarazzante fuori onda con Donald Trump andato in scena durante il vertice alla Casa Bianca per la pace in Ucraina. Tutto ha inizio quando il presidente finlandese Stubb, rivolgendosi allo



The Pursuit


classic.riffusion.com/song/b4e…



La coalizione dei polli da spennare, altro che dei volenterosi...


Zelensky chiede armi Usa per 100 miliardi di dollari pagate dalla UE • Imola Oggi
imolaoggi.it/2025/08/19/zelens…



Nuovo articolo su giardino-punk.it: Anarchism and political modernity // Nathan Jun
giardino-punk.it/anarchism-and…
Leggi: Anarchismo e modernità politica


Alcune delle app VPN utilizzate da milioni di persone contengono chiavi condivise e backdoor nascoste

@Informatica (Italy e non Italy 😁)

Un nuovo studio accademico ha scoperto preoccupanti falle di sicurezza e pratiche ingannevoli in alcune delle app VPN più scaricate al mondo, che complessivamente hanno un impatto su oltre 700 milioni di utenti Android.

La ricerca rivela che decine di servizi VPN popolari, spesso pubblicizzati come indipendenti e sicuri, sono segretamente connessi tramite proprietà condivisa, infrastrutture server e persino credenziali crittografiche, esponendo il traffico degli utenti a sorveglianza e decrittazione.

Il documento è stato redatto da Benjamin Mixon-Baca (ASU/Breakpointing Bad), Jeffrey Knockel ( Citizen Lab /Bowdoin College) e Jedidiah R. Crandall (Arizona State University) ed è stato presentato alla conferenza Free and Open Communications on the Internet (FOCI) 2025. Attraverso una combinazione di analisi APK, indagini sui record aziendali e analisi forense di rete, i ricercatori hanno identificato tre distinte famiglie di provider VPN che offuscano la loro proprietà aziendale e introducono significativi rischi per la sicurezza

cyberinsider.com/vpn-apps-used…

in reply to Informa Pirata

@Informa Pirata

Grazie per le risposte, preciso che non mi riferivo a prodotti gratuiti, sono ben conscio del fatto che se non pago in soldi è perché pago con qualcos'altro, e in questo caso senza neanche sapere "quanto" sto pagando.

È un po' che penso che due lirette in una VPN mi converrebbe spenderle.

E visto che siamo a parlarne (scusate, sono un po' ignorante) esistono soluzioni "self made" che uno può mettere in piedi da solo (tipo WordPress o un'istanza Mastodon) o è proprio un'altra partita?

Anche link sono benvenuti, così non perdete troppo tempo. Vorrei farmi un po' di cultura sulla materia.

in reply to Max 🇪🇺🇮🇹

Il problema è che una soluzione "self-made" per quello che fa una vpn riguardo la tua privacy non esiste. Ovvero, esiste, ma elimina proprio la componente privacy. Potresti avere una vpn verso un tuo homeserver (o server virtuale sul cloud) e stabilire come punto di uscita verso internet, quel server. Ma a quel punto, il tuo IP diventa sempre identificabile perche è soltanto tuo.

Una vpn di aziende terze (proton, mullvad, ecc) ti offre una certa privacy perche il punto di uscita su internet è tuo e di altre persone ma per via di questo non può essere collegato a te e quindi diventa, di fatto, privato.

(C'è un discorso da fare riguardo i log della compagnia vpn, e dei metodi di pagamento, ecc, che si può anche affrontare).

Informa Pirata reshared this.



Ho sognato che mi prodigavo nel fornire a persone mezzi per esprimersi.

Un po' come fa l'amico @Snow.

Oppure come vedo accadere nella serie americana In Treatment, che — a tempo perso — sto seguendo in questi giorni con mia moglie. È una serie televisiva del 2008, molto avvincente, incentrata sulle sedute psicoterapeutiche del protagonista Paul Weston, interpretato dall'irlandese Gabriel Byrne (che conoscevo per avere interpretato il professor Friedrich Bhaer in Piccole Donne ma che ha una filmografia più lunga della Divina Commedia).

La serie è stata prodotta dal colombiano Rodrigo Garcia, figlio dello scrittore Gabriel García Márquez ed è ispirata a una serie israeliana il cui ideatore figura fra i produttori esecutivi.

Estiqaatzi reshared this.



Il tribunale decide che "Pay or Okay" su DerStandard.at è illegale Il Tribunale amministrativo federale austriaco conferma che il quotidiano "DerStandard" ha violato il GDPR introducendo il modello "Pay or Okay". franziska18 August 2025


noyb.eu/it/court-decides-pay-o…




VERSO LA GUERRA?
Comunque vada oggi inizia il processo di disgregazione sia della NATO sia della UE.
Se i leaders europei si allineano ammettono di parlare a vanvera e la loro irrilevanza.
Se non si allineano Trump lascerà a loro il compito di portare la Russia "alla resa", come dice la Picierno e suggerisce anche Provenzano. E buona fortuna.
A quel punto alcuni leaders e alcuni paesi (i volenterosi) sono di fatto in guerra con la Russia. Gli usa inizieranno a ritirare le loro truppe dall'Europa.
La Meloni dovrà scegliere tra questi leaders e Trump. Credo si sgancerà dai volenterosi. Gli USA non lasceranno il territorio italiano e manterranno le loro basi in Italia. Gli serve per il mediterraneo. L'Italia non sarà toccata dalla guerra.
A Spagnoli, slovacchi e ungheresi di fare una guerra non importa davvero. A quel punto la UE e la nato di fatto non esistono più. Al massimo rimangono carrozzoni vuoti.
A quel punto, dato che gli ucraini (quelli reali) non vogliono e non possono più combattere, gli europei volenterosi dovranno combattere, senza il sostegno americano e pagando per le armi che questi forniranno.
Tutti gli amici che si sono ubriacati di retorica saranno accontentati.
Perché parlano di "pace giusta" intendendo che la Russia si arrenda dopo centinaia di miglia di morti. Se fossero meno ipocriti parlerebbero chiaro: la loro pace giusta e' la guerra.
Se l'Europa vuole la guerra, ed è chiaro che vuole solo quello (la kallas è stata chiarissima), avrà la guerra.
(Vincenzo Costa)


📍 Embrun, la città sospesa tra cielo e roccia

Immagina una città che sembra sfidare la gravità, aggrappata a uno sperone roccioso che domina la valle della Durance. Benvenuti a Embrun, la “piccola Nizza delle Alpi” 🌄, dove il sole bacia le pietre antiche e il vento racconta storie millenarie.

Fondata dai Celti con il nome di Eburodunum (da Ebr = acqua e Dun = collina fortificata), Embrun ha sempre avuto un legame profondo con la sua posizione: arroccata su una morena glaciale, il famoso Roc en poudingue, che le dona un panorama mozzafiato e una posizione strategica da cui dominava la Via Domizia, l’antica strada romana che collegava la Gallia all’Italia.

Nel Medioevo fu una potente città episcopale, tanto da essere considerata la capitale delle Alpi Marittime. La sua cattedrale di Notre-Dame-du-Réal, con il suo portico sorvegliato da leoni di pietra e il campanile piramidale, è ancora oggi uno dei gioielli religiosi più importanti delle Alpi francesi.

Ma ciò che rende Embrun davvero unica è il precipizio su cui sorge: una terrazza naturale a 870 metri d’altitudine, da cui si gode una vista a 360° sulle montagne dell’Embrunais e sulla valle sottostante. Un tempo torre di guardia e prigione, oggi la Tour Brune offre uno dei punti panoramici più spettacolari della regione.

📸 Se ti capita di passare da queste parti, non dimenticare di alzare lo sguardo e lasciarti incantare dalla città che sembra sospesa nel tempo… e nello spazio.

#Embrun #StoriaAlpina #ViaggioNelTempo #CittàSospesa #AlteAlpi #NotreDameDuReal #TourBrune #SerrePonçon #NaturaEStoria #PanoramiDaFavola



Tuesday: Oppose Police Social Media Surveillance


Boston Police (BPD) continue their efforts rollout more surveillance tools. This time on social media.

Tuesday, August 19th, the Boston Public Safety Committee will hold a hearing on the Boston 2024 Surveillance Technology Report including police usage of three new tools to monitor social media posts. Any tool BPD uses will feed into the Boston Regional Information Center (BRIC) and Federal agencies such as ICE, CBP and the FBI.

If you want to tell the Boston Public Safety committee to oppose this expansion of surveillance, please show up on the 19th virtually. Details are posted, but to sign up to speak, email ccc.ps@boston.gov and they will send you a video conference link. We especially encourage Boston Pirates to attend and speak against this proposal. The Docket # is 1357.


masspirates.org/blog/2025/08/1…



Con un investimento complessivo di 40,5 milioni di euro si avvia la realizzazione di 54 campus formativi innovativi in tutte le regioni italiane, realizzati dagli istituti tecnici e professionali in partenariato con le Fondazioni ITS Academy, univers…