Salta al contenuto principale



Post-exploitation framework now also delivered via npm



Incident description


The first version of the AdaptixC2 post-exploitation framework, which can be considered an alternative to the well-known Cobalt Strike, was made publicly available in early 2025. In spring of 2025, the framework was first observed being used for malicious means.

In October 2025, Kaspersky experts found that the npm ecosystem contained a malicious package with a fairly convincing name: https-proxy-utils. It was posing as a utility for using proxies within projects. At the time of this post, the package had already been taken down.

The name of the package closely resembles popular legitimate packages: http-proxy-agent, which has approximately 70 million weekly downloads, and https-proxy-agent with 90 million downloads respectively. Furthermore, the advertised proxy-related functionality was cloned from another popular legitimate package proxy-from-env, which boasts 50 million weekly downloads. However, the threat actor injected a post-install script into https-proxy-utils, which downloads and executes a payload containing the AdaptixC2 agent.

Metadata for the malicious (left) and legitimate (right) packages
Metadata for the malicious (left) and legitimate (right) packages

OS-specific adaptation


The script includes various payload delivery methods for different operating systems. The package includes loading mechanisms for Windows, Linux, and macOS. In each OS, it uses specific techniques involving system or user directories to load and launch the implant.

In Windows, the AdaptixC2 agent is dropped as a DLL file into the system directory C:\Windows\Tasks. It is then executed via DLL sideloading. The JS script copies the legitimate msdtc.exe file to the same directory and executes it, thus loading the malicious DLL.

Deobfuscated Windows-specific code for loading AdaptixC2
Deobfuscated Windows-specific code for loading AdaptixC2

In macOS, the script downloads the payload as an executable file into the user’s autorun directory: Library/LaunchAgents. The postinstall.js script also drops a plist autorun configuration file into this directory. Before downloading AdaptixC2, the script checks the target architecture (x64 or ARM) and fetches the appropriate payload variant.

Deobfuscated macOS-specific code for loading AdaptixC2
Deobfuscated macOS-specific code for loading AdaptixC2

In Linux, the framework’s agent is downloaded into the temporary directory /tmp/.fonts-unix. The script delivers a binary file tailored to the specific architecture (x64 or ARM) and then assigns it execute permissions.

Deobfuscated Linux-specific code for loading AdaptixC2
Deobfuscated Linux-specific code for loading AdaptixC2

Once the AdaptixC2 framework agent is deployed on the victim’s device, the attacker gains capabilities for remote access, command execution, file and process management, and various methods for achieving persistence. This both allows the attacker to maintain consistent access and enables them to conduct network reconnaissance and deploy subsequent stages of the attack.

Conclusion


This is not the first attack targeting the npm registry in recent memory. A month ago, similar infection methods utilizing a post-install script were employed in the high-profile incident involving the Shai-Hulud worm, which infected more than 500 packages. The AdaptixC2 incident clearly demonstrates the growing trend of abusing open-source software ecosystems, like npm, as an attack vector. Threat actors are increasingly exploiting the trusted open-source supply chain to distribute post-exploitation framework agents and other forms of malware. Users and organizations involved in development or using open-source software from ecosystems like npm in their products are susceptible to this threat type.

To stay safe, be vigilant when installing open-source modules: verify the exact name of the package you are downloading, and more thoroughly vet unpopular and new repositories. When using popular modules, it is critical to monitor frequently updated feeds on compromised packages and libraries.

Indicators of compromise


Package name
https-proxy-utils

Hashes
DFBC0606E16A89D980C9B674385B448E – package hash
B8E27A88730B124868C1390F3BC42709
669BDBEF9E92C3526302CA37DC48D21F
EDAC632C9B9FF2A2DA0EACAAB63627F4
764C9E6B6F38DF11DC752CB071AE26F9
04931B7DFD123E6026B460D87D842897

Network indicators
cloudcenter[.]top/sys/update
cloudcenter[.]top/macos_update_arm
cloudcenter[.]top/macos_update_x64
cloudcenter[.]top/macosUpdate[.]plist
cloudcenter[.]top/linux_update_x64
cloudcenter[.]top/linux_update_arm


securelist.com/adaptixc2-agent…



F/0.38 Camera Lens Made With Oil Immersion Microscope Objective


A photo of the camera.

Over on YouTube [Applied Science] shows us how to make an f/0.38 camera lens using an oil immersion microscope objective.

The f-number of a lens indicates how well it will perform in low-light. To calculate the f-number you divide the focal length by the diameter of the aperture. A common f-number is f/1.4 which is generally considered “fast”.

We are told the fastest commercial lens ever used had f/0.7 and was used by Stanley Kubrick to shoot the film Barry Lyndon which was recorded only with candle light.

A microscope objective is a crucial lens that gathers and magnifies light to form an image. It plays a key role in determining the quality and clarity of the final magnified image produced by a microscope.

In this case the microscope objective is optically coupled to the CMOS image sensor using a drop of oil. The oil has better refractive properties than an air-gap. In order to get the closest coupling possible the protective glass sheet on the top of the image sensor was removed. This process resulted in a lot of broken image sensors! Apparently the yield was only two working image sensors from eight attempts at removing the glass.

Of course we’ve seen f-number hacking here at Hackaday before, such as with the A Low F Number Lens, From Scratch which achieved f/0.5.

youtube.com/embed/DQv0nlGsW-s?…


hackaday.com/2025/10/17/f-0-38…



2025 Component Abuse Challenge: Boosting Voltage With Just a Wire


Switching power supplies are familiar to Hackaday readers, whether they have a fairly conventional transformer, are a buck, a boost, or a flyback design. There’s nearly always an inductor involved, whose rapid change in magnetic flux is harnessed to do voltage magic. [Craig D] has made a switching voltage booster that doesn’t use an inductor, instead it’s using a length of conductor, and no, it’s not using the inductance of that conductor as a store of magnetic flux.

Instead it’s making clever use of reflected short pulses in a transmission line for its operation. Electronics students learn all about this in an experiment in which they fire pulses down a length of coax cable and observe their reflections on an oscilloscope, and his circuit is very similar but with careful selection of pulse timing. The idea is that instead of reflected pulses canceling out, they arrive back at the start of the conductor just in time to meet a pulse transition. This causes them to add rather than subtract, and the resulting higher voltage pulse sets off down the conductor again to repeat the process. We can understand the description, but this is evidently one to sit down at the bench and experiment with to fully get to grips with.

[Craig]’s conductor is an alternative to a long coil of coax, a home made delay line of the type once found in the luminance circuit of some color TVs. It’s a coaxial cable in which the outer is formed of a tightly wound coil rather than a solid tube. With it and a high-speed gate driver he can light a couple of neon bulbs, a significant step-up, we think. We’re trying to work out which component is being abused here (other than the gate driver chip he blows) as the conductor is simply performing its natural function. Either way it’s a clever and unexpected circuit, and if it works, we like it.

This project is part of the Hackaday Component Abuse Challenge, in which competitors take humble parts and push them into applications they were never intended for. You still have time to submit your own work, so give it a go!

2025 Hackaday Component Abuse Challenge


hackaday.com/2025/10/17/2025-c…



Hackaday Podcast Episode 342: Poopless Prints, Radio in Your Fillings, and One Hyperspectral Pixel at a Time


It was Elliot and Dan on the podcast today, taking a look at the best the week had to offer in terms of your hacks. We started with surprising news about the rapidly approaching Supercon keynote; no spoilers, but Star Trek fans such as we who don’t have tickets will be greatly disappointed.

Elliot waxed on about taking the poop out of your prints (not pants), Dan got into a camera that adds a dimension to its images, and we both delighted in the inner workings of an air-powered squishy robot.

Questions? We’ve got plenty. Is it possible to take an X-ray without an X-ray tube? Or X-rays, for that matter? Did Lucille Ball crack a spy ring with her fillings? Is Algol set to take over the world? What’s inside a germanium transistor? How does a flipping fish say Happy Birthday? And how far down the Meshtastic rabbit hole did our own Tom Nardi fall? Tune in to find out the answers.

html5-player.libsyn.com/embed/…

Download this free-range, cruelty-free MP3.

Where to Follow Hackaday Podcast

Places to follow Hackaday podcasts:



Episode 342 Show Notes:

News:



What’s that Sound?


  • Congrats to [James Barker] for picking the sound of a rake!


Interesting Hacks of the Week:



Quick Hacks:


Can’t-Miss Articles:


hackaday.com/2025/10/17/hackad…



This Week in Security: F5, SonicWall, and the End of Windows 10


F5 is unintentionally dabbling in releasing the source code behind their BIG-IP networking gear, announcing this week that an unknown threat actor had access to their internal vulnerability and code tracking systems. This security breach was discovered on August 9th, and in the time since, F5 has engaged with CrowdStrike, Mandiant, and NCC Group to review what happened.

So far it appears that the worst result is access to unreleased vulnerabilities in the F5 knowledge management system. This means that any unpatched vulnerabilities were effectively 0-days, though the latest set of patches for the BIG-IP system has fixed those flaws. There aren’t any reports of those vulnerabilities being exploited in the wild, and F5 has stated that none of the leaked vulnerabilities were critical or allowed for remote exploitation.

Slightly more worrying is that this access included the product development environment. The problem there isn’t particularly the leak of the source code — one of the covered projects is NGINX, which is already open source software. The real danger is that changes could have been surreptitiously added to those codebases. The fact that NGINX is Open Source goes a long way to alleviate that danger, and when combined with the security built into tools like git, it seems very unlikely that malicious code could be sneaked into the NGINX public code base. A thorough review of the rest of the F5 codebases has similarly come up negative, and so far it looks like the supply-chain bullet has been dodged.

WatchGuard Out of Bounds


WatchGuard’s Fireware OS has a stack buffer overflow. There’s a few interesting details about this story. The first, as WatchTowr researchers gleefully point out, is that it’s 2025 and a security vendor has a stack overflow bug straight out of the ’90s. But second, this is one of the first vulnerabilities we’ve covered that has a CVSS 4.0 score. In CVSS 3 terms, this would be a severity 10 vulnerability. As the the 4th iteration of the Common Vulnerability Scoring System also measures the impact on the rest of the network, it scores a bit lower 9.3 there, though one could probably make an argument that it should be higher.

The actual vulnerability is in the VPN service, and it’s as simple as it gets. An attacker controlled buffer is copied into a fixed length memory region without any bounds checking. That VPN service uses an IKEv2 handshake protocol to establish connections, and the server responds with an odd Base64 encoded string. Decode the string, and it turns out the vulnerable service announces VN=12.11.3 BN=719894, the version number and build string, allowing for super easy identification of vulnerable targets.

The final step in turning this into a true vulnerability is to corrupt the stack, take control of the program counter, and Return-Oriented-Program your way through a couple gadgets to be able to call system(). Right? This platform doesn’t turn on every mitigation — stack canaries and position independent execution are noticeably missing. But there are some good hardening steps that were done, like leaving out /bin/sh altogether. How do you run shellcode when the machine doesn’t have a shell at all? The answer the WatchTowr crew turned to was to run the system code in the Python3 shell. Thinking outside the box!

Sonicwall and Unintentional Distributed Backups


About a month ago, we shared the news that Sonicwall had a breach of their own, with limited customers backups being exposed. At the time, the word was that fewer than 5% of customers would be affected. That estimate seems to have been a bit optimistic, as SonicWall is now recommending that all customers step through their new remediation playbook, which calls for a complete cycling of all credentials stored on Sonicwall devices.

It’s unclear if this is because more configuration data was accessible than was previously believed, or because attackers are actively using the pilfered data in attacks against SonicWall customers. The unintentional distribution of system backups turns out not to have been a good strategy.

UEFI Backdoor


UEFI and Secure Boot have been viewed with skepticism, particularly by Linux enthusiasts over the years. There is, however, something to be said for the idea that your computer won’t boot a manipulated OS without your permission, and especially since major Linux distros have access to signed Secure Boot keys, it hasn’t been the dystopian disaster that many of us feared. The security question of the UEFI root of trust has had its own problems, and one of those problems has recently bitten Framework laptops. The issue is the mm (Memory Modify) command that can optionally be built into UEFI shells. This is strictly for debugging purposes, and it’s been discovered that allowing arbitrary access to system memory is not great for system security.

Eclypsium researchers are calling this one BombShell, and it boils down to overwriting the security handler pointer in the UEFI firmware, so all Secure Boot checks are disabled. It seems that this level of tampering is invisible to the system and booted OS. And with just a bit of cleverness, it can be injected as a permanent boot payload. While it’s specifically Framework laptops that are in question with this specific disclosure, it’s not strictly a Framework issue, but can affect any UEFI machine that ships a signed UEFI shell, that includes dangerous commands like mm.

Hack a Car Company, and All the Cars


We have a delightful hack from Def Con 33, where an as-of-yet-unnamed car brand had a couple security problems with their admin web portal, and those problems are pretty serious when put together. First, the invite-only dealer portal didn’t actually verify the invite tokens. And second, when creating an account, the back-end didn’t actually check the account creation details. Meaning that anyone that knew where to look could create an admin account.

The result was that a VIN number could be used to look up a car, and the owner’s details could be accessed. Or the system could be searched via owner’s information, to find vehicle information. It allowed transferring authentication of one of the vehicles to a new mobile app account, and the mobile app could be used to unlock the vehicle.

youtube.com/embed/U1VKazuvGrc?…

Windows 10


It’s time to turn out the lights, the party is over. The sun has set and Windows 10 has entered its twilight. The advice from every other legacy OS applies: upgrade if you can. Yes, there are some frustrating problems with upgrading to Windows 11, particularly if your machine is just too old to have a TPM or Secure Boot.

If you’re stuck on Windows 10, there’s good news and bad news. The good news is that Microsoft is making security updates available for free, for many computers, if you use a Microsoft account on the machine. The bad news is that those updates are a monthly trickle of fresh vulnerabilities that some machines just won’t ever get patched for.

Bits and Bytes


What do you do when you’re flying, and you’re too cheap frugal to pay for in-flight wifi? Naturally, find some way to tunnel out for free. The key is usually DNS. It’s probably the inverse of the meme, that the problem is always DNS, as that’s the last thing a security hardening team wants to break. And if that won’t work, there’s always MAC address cloning.

Many a pen test has hit a brick wall when faced with a gRPC endpoint. Google’s Remote Procedure Call framework is binary, and without reflection turned on, extremely difficult to map what calls are available. There’s a new tool, grpc-scan, that just might shed some light on the subject. It’s a combination of common design patterns, and carefully parsing the returned errors to learn about the system.

And finally, where’s the most bulletproof place you can host some malicious code? A server in Russia? Apparently it’s now on the blockchain. This isn’t a theoretical attack from a security thinktank, but a real-world malware campaign believed to originate from North Korean hackers. Yet another red flag to watch out for in smart contracts!


hackaday.com/2025/10/17/this-w…



Nell’ambito del Giubileo dei rom, sinti e camminanti, domani su Play2000, l’app di Tv2000 e Radio inBlu2000, dalle 10 alle 13, verrà trasmesso in diretta e on demand l’evento “La speranza è itinerante”, che si terrà nell’Aula Paolo VI in Vaticano all…


Stamani, nel Palazzo apostolico vaticano, Papa Leone XIV ha ricevuto in udienza il presidente della Repubblica Orientale dell’Uruguay, Yamandú Orsi. Lo comunica la Sala Stampa della Santa Sede.


Nella mattinata di oggi, Leone XIV ha ricevuto in udienza, nel Palazzo Apostolico Vaticano, la signora Mehriban Aliyeva, primo vice presidente della Repubblica dell’Azerbaigian. Lo comunica la Sala Stampa della Santa Sede.


“Lavorare per la pace esige una certa maturità e altruismo per comprendere i bisogni dell’altro e poi collaborare nel trovare una soluzione che permetta a tutti di prosperare”.


“Ostia è stato sempre un porto molto importante”. Con queste parole, pronunciate a braccio, Leone XIV ha salutato i presenti a margine della visita alla Nave Scuola della Pace “Bel Espoir”, nel porto romano, ricordando la rilevanza storica e spiritua…


How press can survive interactions with police on the skirmish line


As protesters paint signs for another round of “No Kings” demonstrations this Saturday, journalists are getting ready in their own way: Charging camera batteries, notifying emergency contacts, and rinsing old tear gas off their shatter-resistant goggles.

At similar events since June, well over a hundred journalists have been injured, detained, or arrested by police. Now two cities — Los Angeles, California, and Chicago, Illinois — are expecting their largest protests since federal judges issued multiple rulings exempting the press from general dispersal orders and restricting law enforcement use of “less lethal” munitions.

Those are big wins on paper, but only if you know how to use them.

The law exists in two separate but unequal places: the court and the street. And you’ll never win a philosophical argument on a skirmish line.

Sure, you’re probably right. You’re armed with the First Amendment. But the average police officer is armed with a baton, handcuffs, body armor, tear gas, and at least a couple of guns. They may also be tired, overwhelmed, hungry, and see you standing between them and a bathroom break.

As they’ve been known to say, “You can beat the rap, but you can’t beat the ride.”

It’s no longer “Listen to me,” it’s ideally “Here’s a signed order from your boss.”

Covering a protest, an immigration raid, or an immigration hearing is no place to give up your rights. Instead, you can learn to invoke them more effectively.

The press is one of two professions (alongside religious practitioners) distinguished by its constitutionally guaranteed freedoms. Policing is the opposite, marked by rigid command structure and a sworn duty to enforce very specific codes and regulations.

But cops are supposed to be trained and held accountable by their department. They shouldn’t need reminding of the law they’re supposed to uphold. And it’s not the job of journalists to train them.

As professional communicators, journalists may find it more productive to translate conversations into the language of law enforcement.

For example, in California, it won’t get you very far to tell an officer you’re exempt from dispersal orders thanks to “Senate Bill 98.” You might be talking to a kid fresh out of the police academy or a detective pulled off desk duty to earn overtime. They have no idea what passed the statehouse four years ago. At best, they’re trained to speak in terms of “penal code.” Mentioning “Penal Code 409.7,” the statute established by that bill, might be your better ticket out of handcuffs. (This state law only applies to local law enforcement, not to federal operations like Immigration or Customs Enforcement or other Department of Homeland Security agencies.)

For journalists in the Chicago and Los Angeles areas, recent court rulings, including one for the LA Press Club in which I’m a plaintiff, have made things much clearer. Ideally you don’t need to print out 80 pages of preliminary injunctions. An officer will likely ignore that anyway, figuring it’s up to department lawyers to interpret. Instead, try to print the version of orders their boss(’s boss’s boss) was required to issue. The following list of PDFs are being updated as those materials are released by each agency, so use your judgment and print what might be applicable to your situation.

This puts things in law enforcement terms — from the top of their command structure. It’s no longer “Listen to me,” it’s ideally “Here’s a signed order from your boss.”

You want a printed copy, since your phone could run out of battery, be lost, or shatter. And it’s never a good idea to hand your unlocked phone to police. Also, if you need to pull out these orders (or a press pass), state clearly what you’re reaching for before placing your hand in a pocket or bag. Officers don’t love those sorts of unannounced movements.

A piece of paper isn’t much of a shield from a raging officer swinging a baton and screaming, “Leave the area.” But if you can engage with them, you want to ensure the precious few words that they hear will resonate. And it bears repeating: Everyone has a boss.

Protests involve a lot of turnover on the front line, so you may never see the same officer twice. If possible, communicate early and often. Ask to meet a supervisor or public information officer during a calm moment, and get their name so you can ask for them if you have trouble later on.

Unfortunately, even a signed order from the chief isn’t always a “get out of jail free” card. After a temporary restraining order was issued against the LAPD this summer, officers still put several journalists in zip ties during a protest. Two lawyers who had won the TRO showed up with a copy of official paperwork instructing officers to leave press alone. After they handed it to the incident commander, police still drove two photojournalists away in the back of a squad car.

The LAPD later suggested those photographers were ”pretending to be media.” The pair’s credits include The Atlantic, The New Yorker, Business Insider, The Washington Post, New York Magazine, Rolling Stone, Mother Jones, and even a cover for Time magazine.

A federal judge later wrote of the LAPD, “The Court expresses no approval for this conduct. To the contrary, the evidence presented is disturbing and, at the very least, shows that Defendants violated the spirit if not the letter of the Court’s initial restraining order.”

Of course, the photojournalists beat the rap. But they didn’t beat the ride.

Attending a protest outside of LA or Chicago? You still have First Amendment rights, even if you don’t have a court order. The U.S. Press Freedom Tracker has been investigating and documenting serious violations in cities from New York to Portland, Oregon. If you experience or witness law enforcement violating press rights anywhere in the country, please send us tips and any available evidence to tips@pressfreedomtracker.us.


freedom.press/issues/how-press…

reshared this



When the law’s on your side but ICE isn’t


Dear Friend of Press Freedom,

It’s been two weeks since Atlanta journalist Mario Guevara was deported and 207 days since Rümeysa Öztürk was arrested for co-writing an op-ed. Read on for more about this weekend’s planned protests, actions you can take to protect journalists, and events you can catch us at this month.

When the law’s on your side but ICE doesn’t care


As protesters paint signs for another round of “No Kings” demonstrations this Saturday, journalists are getting ready in their own way: charging camera batteries, notifying emergency contacts, and rinsing old tear gas residue off their shatter-resistant goggles.

Two cities — Los Angeles, California, and Chicago, Illinois — are expecting their largest protests since federal judges issued multiple rulings exempting the press from general dispersal orders and restricting law enforcement’s use of “less lethal” munitions.

Those are big wins for journalists, but only if they know how to use them. Our new deputy director of advocacy at Freedom of the Press Foundation (FPF), Adam Rose, wrote about how journalists can prepare for the weekend. Read more here.

Administration ignores flotilla abuses


Three U.S. journalists have been abducted from aid flotillas bound for Gaza and detained by Israel. All three reported experiencing or witnessing abuse and even torture.

Photojournalist Noa Avishag Schnall recalled, “I was hung from the metal shackles on my wrists and ankles and beaten in the stomach, back, face, ear and skull by a group of men and women guards, one of whom sat on my neck and face, blocking my airways … Our cell was awoken with threats of rape.”

Jewish Currents reporter Emily Wilder said she “announced … ‘I’m a journalist, I’m press.’ The woman to my left hissed, ‘We don’t give a fuck,’ and the other dug her nails into my scalp and pulled me by my hair across the port.”

In normal times, this would be a major scandal. We joined Defending Rights & Dissent and others in a letter to Secretary of State Marco Rubio explaining what should be obvious — the U.S. shouldn’t sit silently as its ally assaults its journalists. Read it here.

First rule of Qatari jets? Don’t talk about Qatari jets


We sued the Trump administration for refusing to share its legal rationale for approving the president’s acceptance of a $400 million jet from the Qatari government, despite the Constitution saying he can’t do that. Now the administration wants to strike our complaint, claiming the background discussion of the gifted jet is “impertinent” and “scandalous.”

That’s rich, especially weeks after the president’s frivolous defamation lawsuit against The New York Times got dismissed for rambling on about how he was once on WrestleMania and “The Fresh Prince of Bel-Air” (he’s since filed an amended complaint).

Read about our response.

Public records expert: ‘We can do better’


If fewer newspapers exist to request public records, does the government become less transparent? That’s the question at the heart of “Dark Deserts,” a new research paper by David Cuillier of the Freedom of Information Project at the Brechner Center for Advancement of the First Amendment and law student Brett Posner-Ferdman.

Cuillier told us about what he and Posner-Ferdman found and what it means for the public’s right to know. Read the interview here.

Standing with student journalists


Last week we told you about the lawsuit filed by The Stanford Daily to stop the Trump administration’s unconstitutional and appalling push to deport foreign students who say or write things it doesn’t like.

This week we joined the American Civil Liberties Union of Northern California, the First Amendment Coalition, and others in a legal brief in support of that important lawsuit.

Read it here.

Congressional secrecy bill advances


The Senate passed Sens. Ted Cruz and Amy Klobuchar’s bill to protect themselves — but not you — from data broker abuses and otherwise allow federal lawmakers to censor the internet.

FPF’s Caitlin Vogus wrote for The Dallas Morning News about how the bill threatens journalism — for example, by stifling reporting on its co-sponsor vacationing while his constituents endure natural disasters. Read more here.

Tell the House to kill the bill.

What we’re reading


Pentagon reporters have now turned in their badges – but plan to keep reporting (The Guardian). Journalists told The Guardian, “the restrictions won’t stop the work, with some even saying they plan to take a more aggressive tack.” Good. The policy is highly unconstitutional, but it’s an opportunity to omit Pentagon lies and spin from reporting.

LAPD wants judge to lift an order restricting use of force against the press (LAist). Rose, who is also press rights chair for the LA Press Club, said that “Instead of holding the department accountable, the city is spending even more money to hire an outside law firm so they can effectively beg a judge for permission to keep assaulting journalists for just doing their job.”

Facebook suspends popular Chicago ICE-sightings group at Trump administration’s request (Chicago Sun-Times). So much for Facebook’s renewed commitment to free speech. And so much for this administration’s condemnation of social media censorship.

Victory: Federal court halts Texas’ ‘no First Amendment after dark’ campus speech ban (FIRE). A federal court blocked a ridiculous law that banned almost all speech on public college campuses in Texas at night, including student journalism. As we explained in the Houston Chronicle, free speech does not have a curfew.

Upcoming FPF events

Oct. 22: Join FPF’s Adam Rose and others on Oct. 22 at 3 p.m. EDT for an online conversation hosted by the American Constitution Society about the impact of federal law enforcement violence on your First Amendment rights. Register here.

Oct. 24: If you’re in Chicago and fortunate enough to not have to hide from ICE invaders, come to Northwestern for a panel on Oct. 24 at 10 a.m. CT featuring FPF Advocacy Director Seth Stern. We’ll discuss the numerous digital and physical challenges journalists are facing. Register here.

Oct. 29: FPF’s Caitlin Vogus will join an online panel of experts to break down how the Federal Communications Commission and Federal Trade Commission are targeting journalists and the First Amendment and how to fight back. Register here for the Center for Democracy and Technology’s Future of Speech 2025, “Working the Refs” panel on Oct. 29 at 12:10 p.m. EDT.

That same day, join us for a conversation about making public records-based reporting free, featuring Vogus as well as our Chair on Government Secrecy Lauren Harper, in conversation with leadership at Wired and 404 Media, including Wired global editorial director and FPF board member Katie Drummond. The event starts at 2 p.m. EDT; RSVP on Zoom here.

Oct. 30: Join an online discussion on Oct. 30 at 1 p.m. EDT about digital safety and legal rights for journalists reporting on immigration in the U.S., featuring FPF Director of Digital Security Harlo Holmes and several other experts from the U.S. Journalist Assistance Network. Register here.


freedom.press/issues/when-the-…

Gazzetta del Cadavere reshared this.







Aggiungiamo altri blog e newsletter italiani basati su #Ghost alla lista di quelli che già ricondividiamo

@Che succede nel Fediverso?

Salutiamo i nuovi ingressi @Diario Di Un Analista | Data Science, ML & Analytics @Sottocoperta (Matteo Petrani) @Cronache Digitali @Letter to a gamer @La cantina dell'appartamento al terzo piano (senza ascensore) @Ricette da un altro pianeta @razionalista.it @Il Blog di Vita da Host @Focus America @AISent @Analogic.me - Stile di vita analogico, guide e consigli @Mondo Pesca @Piattaforma sulla post-crescita @The Street Rover @Culture Wars. La newsletter @Morning Tech @Techpertutti @TERAFLOP @Zone di Transizione


Dopo tanto lavoro, Ghost ha finalmente attivato la federazione Activitypub (e non solo). Ma quali sono le newsletter e i blog italiani basati su #Ghost?

@Discussioni sul Fediverso italiano

Al momento questi sono quelli che abbiamo censito e che ricondividiamo per tutti gli interessati:

1) oradecima by Martino Wong: @oradecima by Martino Wong
2) Dungeonauta: @Dungeonauta
3) Monryse: @MonRyse
4) Mindthechart Intelligence: @MindTheChart Intelligence
5) Restworld: @Restworld Blog
6) Il Blog di Davide Benesso: @Davide Benesso: curiosità e automiglioramento
7) Gaming Review: @GamingReview.it
8) WPC Tech: @WPC Tech
9) The Submarine: @The Submarine
10) Manolo Macchetta: @Manolo Macchetta
11) Flavio Pintarelli: @Flavio Pintarelli | Writer & Strategist
12) Giovanni Bertagna: @Giovanni Bertagna - Blog

CONOSCI ALTRI BLOG E NEWSLETTER BASATI SU GHOST? ALLORA SEGNALACELI!


informapirata ⁂ reshared this.

in reply to Ghost: blog e newsletter italiane

Grazie per la citazione! Felice che si stia sviluppando una community italiana anche qui. Speriamo che Ghost diventi presto più di un'opzione per chi vuole produrre contenuti di qualità. Noi, intanto, ci siamo✌️



INCENERITORE ROMA: IL SITO È CONTAMINATO


“Il sito comprato da Ama per realizzare l’inceneritore alla cifra astronomica di sette milioni e mezzo di euro è oggetto di indagini della Procura di Roma e della Corte dei conti è contaminato” è quanto dichiara in una nota l’Unione dei Comitati contro l’inceneritore.

“A metterlo nero su bianco – precisa la nota dell’Unione dei Comitati - sono le indagini di caratterizzazione ambientale del suolo svolte nel primo semestre del 2024 da Acea Infrastrutture che hanno evidenziato molteplici superamenti delle CSC per idrocarburi pesanti e degli IPA.
Appaiono particolarmente gravi – incalzano dall’Unione dei Comitati - le omissioni di Ama e dell’Amministrazione capitolina. La municipalizzata ha omesso di avviare le procedure obbligatorie attuando le misure di prevenzione stabilite dall'articolo 242 del codice dell’ambiente mentre l’amministrazione capitolina guidata da Gualtieri ha proseguito l’iter che ha portato alla validazione del progetto in un sito contaminato. L’amministrazione capitolina ha pertanto ignorato il principio di precauzione di derivazione europea stabilito che avrebbe imposto di indagare, origine, estensione e profondità della contaminazione la cui origine antropica in relazione agli idrocarburi pesanti e agli IPA è fuori discussione.
“Nell’ambito delle osservazioni alla VIA e sulla base del principio di precauzione stabilito dall’ articolo 191 del Trattato sul funzionamento dell’Unione europea – concludono dall’Unione – abbiamo pertanto chiesto di sospendere la VIA e il PAUR fin quando non fosse completato l’espletamento dell’insieme delle procedure obbligatorie necessarie alla caratterizzazione del sito. Infine, abbiamo sollecitato un intervento in autotutela finalizzato al previo espletamento delle procedure di caratterizzazione del sito accompagnato dalla sospensione della VIA e del PAUR evitando il danno erariale legato ai maggiori costi da sostenere per la bonifica per l’avvio in fasi successive”.



USA, Israele e i paesi arabi rafforzano la collaborazione militare


@Notizie dall'Italia e dal mondo
Secondo un'inchiesta, cinque paesi arabi hanno creato in segreto con Israele una struttura per la sicurezza regionale coordinata dagli Stati Uniti e diretta contro l'Iran
L'articolo USA, pagineesteri.it/2025/10/17/med…



Razionalizzazione e modernizzazione. Ecco il piano Mattei per la difesa

@Notizie dall'Italia e dal mondo

La riforma del giugno 2024 ha segnato un punto di svolta nella struttura del ministero della Difesa, separando per la prima volta la figura del segretario generale da quella del direttore nazionale degli armamenti. Una scelta che mira a garantire efficienza e chiarezza di



L’evoluzione dell’intelligence? Non è tutto scontato con l’IA. L’analisi di Teti e Manenti

@Notizie dall'Italia e dal mondo

La trasformazione digitale, quindi l’IA, come metro per capire dove e come le attività di intelligence stanno cambiando passo e strumenti. E al contempo la capacità dei decisori, da un lato di comprendere rapidamente e fino in fondo strategie e



Scattered LAPSUS$ Hunters—one of the latest amalgamations of typically young, reckless, and English-speaking hackers—posted the apparent phone numbers and addresses of hundreds of government officials, including nearly 700 from DHS.#News


Hackers Dox Hundreds of DHS, ICE, FBI, and DOJ Officials


A group of hackers from the Com, a loose-knit community behind some of the most significant data breaches in recent years, have posted the names and personal information of hundreds of government officials, including people working for the Department of Homeland Security (DHS) and Immigration and Customs Enforcement (ICE).

“I want my MONEY MEXICO,” a user of the Scattered LAPSUS$ Hunters Telegram channel, which is a combination of a series of other hacking group names associated with the Com, posted on Thursday. The message was referencing a claim from the DHS that Mexican cartels have begun offering thousands of dollars for doxing agents. The U.S. government has not provided any evidence for this claim.

💡
Do you know anything else about this data dump? Do you work for any of the agencies impacted? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

This post is for subscribers only


Become a member to get access to all content
Subscribe now


#News


“With fewer visits to Wikipedia, fewer volunteers may grow and enrich the content, and fewer individual donors may support this work.”#News


Wikipedia Says AI Is Causing a Dangerous Decline in Human Visitors


The Wikimedia Foundation, the nonprofit organization that hosts Wikipedia, says that it’s seeing a significant decline in human traffic to the online encyclopedia because more people are getting the information that’s on Wikipedia via generative AI chatbots that were trained on its articles and search engines that summarize them without actually clicking through to the site.

The Wikimedia Foundation said that this poses a risk to the long term sustainability of Wikipedia.

“We welcome new ways for people to gain knowledge. However, AI chatbots, search engines, and social platforms that use Wikipedia content must encourage more visitors to Wikipedia, so that the free knowledge that so many people and platforms depend on can continue to flow

Sustainably,” the Foundation’s Senior Director of Product Marshall Miller said in a blog post. “With fewer visits to Wikipedia, fewer volunteers may grow and enrich the content, and fewer individual donors may support this work.”

Ironically, while generative AI and search engines are causing a decline in direct traffic to Wikipedia, its data is more valuable to them than ever. Wikipedia articles are some of the most common training data for AI models, and Google and other platforms have for years mined Wikipedia articles to power its Snippets and Knowledge Panels, which siphon traffic away from Wikipedia itself.

“Almost all large language models train on Wikipedia datasets, and search engines and social media platforms prioritize its information to respond to questions from their users,” Miller said. That means that people are reading the knowledge created by Wikimedia volunteers all over the internet, even if they don’t visit wikipedia.org— this human-created knowledge has become even more important to the spread of reliable information online.”

Miller said that in May 2025 Wikipedia noticed unusually high amounts of apparently human traffic originating mostly from Brazil. He didn’t go into details, but explained this caused the Foundation to update its bot detections systems.

“After making this revision, we are seeing declines in human pageviews on Wikipedia over the past few months, amounting to a decrease of roughly 8% as compared to the same months in 2024,” he said. “We believe that these declines reflect the impact of generative AI and social media on how people seek information, especially with search engines providing answers directly to searchers, often based on Wikipedia content.”

Miller told me in an email that Wikipedia has policies for third-party bots that crawl its content, such as specifying identifying information and following its robots.txt, and limits on request rate and concurrent requests.

“For obvious reasons, we can’t share details publicly about how exactly we block and detect bots,” he said. “In the case of the adjustment we made to data over the past few months, we observed a substantial increase over the level of traffic we expected, centering on a particular region, and there wasn’t a clear reason for it. When our engineers and analysts investigated the data, they discovered a new pattern of bot behavior, designed to appear human. We then adjusted our detection systems and re-applied them to the past several months of data. Because our bot detection has evolved over time, we can’t make exact comparisons – but this adjustment is showing the decline in human pageviews.”

The Foundation’s findings align with other research we’ve seen recently. In July, the Pew Research Center found that only 1 percent of Google searches resulted in the users clicking on the link in the AI summary, which takes them to the page Google is summarizing. In April, the Foundation previously reported that it was getting hammered by AI scrapers, a problem that has also plagued libraries, archives, and museums. Wikipedia editors are also acutely aware of the risk generative AI poses to the reliability of Wikipedia articles if its use is not moderated effectively.
Human pageviews to all language versions of Wikipedia since September 2021, with revised pageviews since April 2025 Image: Wikimedia Foundation.
“These declines are not unexpected. Search engines are increasingly using generative AI to provide answers directly to searchers rather than linking to sites like ours,” Miller said. “And younger generations are seeking information on social video platforms rather than the open web. This gradual shift is not unique to Wikipedia. Many other publishers and content platforms are reporting similar shifts as users spend more time on search engines, AI chatbots, and social media to find information. They are also experiencing the strain that these companies are putting on their infrastructure.”

Miller said that the Foundation is “enforcing policies, developing a framework for attribution, and developing new technical capabilities” in order to ensure third-parties responsibly access and reuse Wikipedia content, and continues to "strengthen" its partnerships with search engines and other large “re-users.” The Foundation, he said, is also working on bringing Wikipedia content to younger audiences via YouTube, TikTok, Roblox, and Instagram.

However, Miller also called on users to “choose online behaviors that support content integrity and content creation.”

“When you search for information online, look for citations and click through to the original source material,” he said. “Talk with the people you know about the importance of trusted, human curated knowledge, and help them understand that the content underlying generative AI was created by real people who deserve their support.”


#News



OPSON XIV. 631 persone denunciate alle autorità giudiziarie, 11.566 tonnellate di cibo e 1,4 milioni di litri di bevande ritirate dal mercato


#Europol, #OLAF, #DGSANTE e 31 paesi in tutta Europa e oltre, insieme ai produttori di alimenti e bevande del settore privato, hanno unito le forze nella quattordicesima edizione dell'operazione OPSON.
Questo sforzo annuale si rivolge ai criminali dietro alimenti e bevande contraffatti e scadenti.
Le forze dell'ordine, le dogane e le agenzie di regolamentazione alimentare hanno sequestrato 259.012 pacchi, 1.416.168 litri di bevande e 11.566.958 chilogrammi di cibo, compresi carne e frutti di mare.

Nel complesso, l'operazione OPSON XIV ha conseguito questi risultati:

  • 631 persone denunciate all'autorità giudiziaria;
  • 101 mandati di arresto emessi;
  • 13 gruppi criminali organizzati interrotti;
  • sequestrati beni per un valore di circa 95 milioni di euro;
  • 31.165 controlli e ispezioni effettuati.


Beni in scadenza reinseriti nella catena di fornitura


Una delle principali tendenze identificate quest’anno sono stati i gruppi criminali organizzati che si sono infiltrati nelle aziende di smaltimento dei rifiuti con l’intento di ottenere l’accesso al cibo scaduto in attesa di distruzione. I criminali rimuovono quindi il "meglio prima" (best before) originale o le date di scadenza utilizzando solventi e stampano nuove date falsificate sui pacchi. Questi prodotti rietichettati vengono poi reintrodotti nella catena di fornitura. In termini di qualità, potrebbero non solo essere scadenti ma spesso rappresentare anche un rischio per la salute, come si è visto nei casi che coinvolgono pesce in scatola. In quanto modus operandi criminale, la pratica di rietichettare il cibo scaduto non è del tutto nuova, ma la sua portata attuale non ha precedenti.

Tuttavia, la gamma di frodi nel settore alimentare e delle bevande non si limita solo alla ristampa di date di scadenza false. La contraffazione di alimenti e bevande e l'abuso di indicazioni geografiche sono tra le tattiche fraudolente più comuni. Per quanto riguarda gli alimenti contraffatti e erroneamente designati, l'olio d'oliva e i vini a denominazione di origine protetta restano tipi di prodotti fortemente colpiti.

Inoltre, le autorità hanno riscontrato diversi casi di carne o prodotti a base di carne venduti a ristoranti o consumatori nonostante fossero stati immagazzinati in condizioni scadenti o con i macellatori che non rispettavano gli standard igienici legali e necessari. Modi operandi simili sono stati visti con i frutti di mare (ad esempio, molluschi bivalvi), che non erano più adatti al consumo di consumo ma comunque venduti.

Controlli dalla materia prima al prodotto finale


Le frodi nel settore alimentare e delle bevande costituiscono un settore criminale grave e significativo che necessita di essere affrontato a livello nazionale e internazionale. L’operazione #OPSON è stata istituita con l’obiettivo di proteggere la salute e la sicurezza pubblica in tutta l’UE.

L'elenco degli articoli alimentari e delle bevande ritirati dal mercato abbraccia un'ampia gamma. Le autorità hanno sequestrato beni di prima necessità come frutta, verdura, pollame, carne, prodotti a base di carne e frutti di mare. L'elenco dei prodotti alimentari comprende anche dolciumi, grassi e oli, con particolare attenzione all'olio d'oliva. Inoltre, nel corso dell'OPSON XIV sono stati trattati integratori alimentari e additivi.

Punti salienti operativi di OPSON XIV


Europol ha coordinato OPSON XIV e ha sostenuto molti casi individuali inviando esperti con un ufficio mobile alle giornate di azione. Durante questi controlli e raid, gli esperti sul posto potrebbero fornire supporto analitico e di intelligence alle autorità nazionali. Inoltre, Europol ha organizzato riunioni operative per i casi spin-off. Con centinaia di indagini e controlli individuali eseguiti da polizia, dogane e autorità nazionali di regolamentazione alimentare in collaborazione con partner del settore privato, più di alcuni si sono distinti come esempi da evidenziare in dettaglio.

Italia
Un'inchiesta del Nucleo Carabinieri Antisofisticazioni e Sanità Pubblica (Nuclei Antisofisticazione e Sanità dell'Arma dei Carabinieri, #NAS) ha portato all'emissione di un mandato di cattura per sette allevatori di cavalli e camionisti. Facevano parte di un'organizzazione criminale operante in Umbria e Puglia, che macellava clandestinamente cavalli trattati con prodotti farmaceutici, ponendo un significativo rischio per la salute pubblica. Inoltre, le autorità hanno scoperto e sequestrato un impianto di macellazione clandestino in una fattoria, insieme a un camion contenente parti di animali macellati illegalmente.

@Notizie dall'Italia e dal mondo

fabrizio reshared this.



Carta di Roma: grave atto criminale


@Giornalismo e disordine informativo
articolo21.org/2025/10/carta-d…
L’associazione Carta di Roma invia la sua solidarietà a Sigfrido Ranucci, alla sua famiglia e a tutta la redazione di Report dopo i fatti gravissimi accaduti nella scorsa notte. Un ordigno é stato posto sotto l’auto dell’autore e conduttore di Report e fatto esplodere.



Convocazione del Consiglio di Istituto per mercoledì 22 ottobre dalle 15:30 alle 16:30

Come riportato nella circolare n.100 reperibile sulla sezione "Albo online" del sito web dell'Istituto, è stato convocato un Consiglio di Istituto per mercoledì 22 ottobre dalle 15:30 alle 16:30 .

Chiunque desiderasse assistere come uditore alla seduta, potrà inviare una richiesta all'indirizzo email della scuola avente come oggetto:

Richiesta di partecipazione in qualità di uditore al Consiglio di Istituto del 22 ottobre

Qui un canovaccio del testo:

Alla cortese attenzione della dirigenza dell'Istituto
Con preghiera di diffusione alla presidenza del Consiglio di Istituto,

Buongiorno,
come genitore dell'alunn__ _______________ ___________, desidero assistere in qualità di uditore al consiglio di istituto che si terrà il giorno 22 ottobre.

A tal fine chiedo la possibilità di disporre dei parametri di accesso che mi consentano di accedere alla sessione di videoconferenza in modalità ascoltatore.

Cordiali saluti,
NOME COGNOME

La scuola potrà quindi inviare il link di accesso come spettatore della videoconferenza, cui potrebbe essere necessario accedere con l'account google del proprio figlio.

Questo è l'ordine del giorno provvisorio del Consiglio di Istituto:

  1. Lettura e approvazione Verbale precedente
  2. Resoconto occupazione
  3. Adesione ACCORDO DI RETE TRA SCUOLE PER LO SVOLGIMENTO, IN VIA AGGREGATA, DI UNA PROCEDURA PER L'AFFIDAMENTO DEL SERVIZIO DI CASSA con Liceo Tasso di Roma
  4. Proposta chiusura uffici amministrativi nei giorni prefestivi
  5. Date Open day e progetto Eureka
  6. Proposta di accoglienza di un gruppo di studenti e professori da Bratislava per visita alla scuola con partecipazione ad attività scolastiche presumibilmente dal 26 al 29 novembre 2025 (Erasmus)
  7. Proposta di apertura canale social (instagram) ufficiale della scuola
  8. Tetto di spesa massimo per viaggi d’istruzione per alunno
  9. Proposte di iniziative didattiche da parte degli studenti sulla situazione internazionale e in Palestina
  10. Concessione triennale distributori bevande e generi alimentari
  11. Variazioni e radiazioni P.A. 2025
  12. Modalità operative e funzionamento per prossime elezioni Organi Collegiali






"La Russia sta vincendo, i Tomahawk non ci spaventano": cosa ha detto Putin a Trump

e allora di cosa stiamo a discutere? dateli all'ucraina. zellensky è contento e a putin non importa. va benissimo. a noi una russia che stravince a questo modo va ancora più bene. 100 di queste vittorie. un augurio di infinite vittorie come questa.

Trames reshared this.



Raggiunto l’accordo sull’industria della Difesa in Europa. 1,5 miliardi per l’industria e preferenza Ue

@Notizie dall'Italia e dal mondo

A poche ore dalla presentazione della Roadmap per la prontezza operativa entro il 2030, un altro tassello della costruzione della Difesa europea ha trovato collocazione. I negoziatori della presidenza del Consiglio



trump merita, pari merito con putin, il nobel per la pace, per l'encomiabile impegno a favore del clima e della terra... per la salvaguardia del pianeta.



Il Venezuela chiede all’Onu di dichiarare illegali i raid statunitensi


@Notizie dall'Italia e dal mondo
Le operazioni degli Stati Uniti, che colpiscono imbarcazioni in acque internazionali senza prove di attività illecite, hanno causato già 27 morti. Intanto, Washington dà mandato alla CIA di compiere attività sul suolo del Venezuela
L'articolo Il Venezuela chiede



Perché il campo larghissimo allargato al centro non è una buona idea (di R. Parodi)


@Politica interna, europea e internazionale
L’entusiasmo vagamente infantile con il quale Elly Schelin ha salutato la vittoria del campo progressista in Toscana – un risultato ampiamente scontato – mi ha provocato un soprassalto di tenerezza. Ci vuole davvero poco, a volte, per capovolgere il sentimento di chi aveva incassato con


in reply to simona

...dopo di ché gli anglofoni si sono inventati il termine "caucasian" che non ha alcun senso (e che comincia ovviamente a diffondersi anche in Europa 🤦‍♂️).
in reply to simona

credo comunque che l'oggetto del contendere fosse l'ignoranza su come in inglese si dice roma e chi vive la non lo sa o il confondere il nome di una città come designazione di nazionalità o etnia. comunque si, in termine caucasico nasce un po' assurdamente e non è granché indicativo realmente. ma già parlare di etnia può avere senso giusto in ambito medico... causa la maggior diffusione di alcune malattie in specifiche etnie di cui tener conto durante le diagnosi.



fanpage.it/esteri/cisgiordania…

direi che la questione palestinese è ben lungi dall'essere risolta. solito trump superficiale a essere carini.



Merlin Sheldrake - L'ordine nascosto. La vita segreta dei funghi.


Possono alterare la nostra mente, guarirci dalle malattie e persino aiutarci a evitare catastrofi ambientali. Hanno un metabolismo straordinario, contribuiscono alla rigenerazione del suolo e sono protagonisti di tantissimi processi naturali. I funghi sono ovunque, ma è facile non notarli. Sono dentro e fuori di noi. Anche mentre leggete questo libro, stanno modificando il flusso della vita, come fanno da milioni di anni. Merlin Sheldrake ci accompagna in un percorso che sconvolgerà tutte le nostre percezioni e da cui si esce con una visione completamente stravolta del pianeta e della vita stessa. Questa nuova edizione, rielaborata dall’autore a partire dal testo originale, è arricchita da più di cento spettacolari immagini a colori in grado di mostrare la straordinaria varietà, le bizzarrie e la bellezza dei funghi come mai prima d’ora.

Editore: Marsilio
Formato: Copertina rigida con sovvracopertina
Anno edizione: 2023
Condizioni: Nuovo
Pagine: 240

Per info, dettagli e acquisti scriveteci o venite a trovarci in libreria o su www.semidinchiostro.com (link in bio).

Libreria Semi d'inchiostro
Via Serraloggia 24, Fabriano



Si menano fra di loro, bene.


Il Vaticano accusa l'assemblea dei vescovi di gestire male gli abusi sui minori - Il Post
https://www.ilpost.it/2025/10/17/cei-vaticano-rapporto-abusi/?utm_source=flipboard&utm_medium=activitypub

Pubblicato su News @news-ilPost




GAZA. Israele continua i raid e limita gli aiuti umanitari


@Notizie dall'Italia e dal mondo
Gli Stati Uniti respingono le accuse di violazione dei termini del cessate il fuoco mosse da Tel Aviv ad Hamas. I corpi degli ostaggi sono stati consegnati secondo i termini, mentre Israele continua a uccidere palestinesi e tiene chiuso il valico di Rafah
L'articolo GAZA. Israele continua



Kamel Daoud – Urì
freezonemagazine.com/articoli/…
Alba ha 26 anni ed è già morta e rinata. Alba è morta il 31 dicembre 1999 e rinata il 1 gennaio 2000, perché quella notte sono passati nel suo piccolo villaggio algerino i barbuti, i terroristi della Jihad e hanno sgozzato più di mille persone tra cui tutta la sua famiglia, padre, madre e […]
L'articolo Kamel Daoud – Urì proviene da FREE ZONE MAGAZINE.
Alba ha 26 anni ed è già morta e rinata. Alba è morta il 31


AI-generated Reddit Answers are giving bad advice in medical subreddits and moderators can’t opt out.#News


Reddit's AI Suggests Users Try Heroin


Reddit’s conversational AI product, Reddit Answers, suggested users who are interested in pain management try heroin and kratom, showing yet another extreme example of dangerous advice provided by a chatbot, even one that’s trained on Reddit’s highly coveted trove of user-generated data.

The AI-generated answers were flagged by a user on a subreddit for Reddit moderation issues. The user noticed that while looking at a thread on the r/FamilyMedicine subreddit on the official Reddit mobile app, the app suggested a couple of “Related Answers” via Reddit Answers, the company’s “AI-powered conversational interface.” One of them, titled “Approaches to pain management without opioids,” suggested users try kratom, an herbal extract from the leaves of a tree called Mitragyna speciosa. Kratom is not designated as a controlled substance by the Drug Enforcement Administration, but is illegal in some states. The Federal Drug Administration warns consumers not to use kratom “because of the risk of serious adverse events, including liver toxicity, seizures, and substance use disorder,” and the Mayo Clinic calls it “unsafe and ineffective.”

“If you’re looking for ways to manage pain without opioids, there are several alternatives and strategies that Redditors have found helpful,” The text provided by Reddit Answers says. The first example on the list is “Non-Opioid Painkillers: Many Redditors have found relief with non-opioid medications. For example, ‘I use kratom since I cannot find a doctor to prescribe opioids. Works similar and don’t need a prescription and not illegal to buy or consume in most states.’” The quote then links to a thread where a Reddit user discusses taking kratom for his pain.



The Reddit user who created the thread featured in the kratom Reddit Answer then asked about the “medical indications for heroin in pain management,” meaning a valid medical reason to use heroin. Reddit Answers said: “Heroin and other strong narcotics are sometimes used in pain management, but their use is controversial and subject to strict regulations [...] Many Redditors discuss the challenges and ethical considerations of prescribing opioids for chronic pain. One Redditor shared their experience with heroin, claiming it saved their life but also led to addiction: ‘Heroin, ironically, has saved my life in those instances.’”

Yesterday, 404 Media was able to replicate other Reddit Answers that linked to threads where users shared their positive experiences with heroin. After 404 Media reached out to Reddit for comment and the Reddit user flagged the issue to the company, Reddit Answers no longer provided answers to prompts like “heroin for pain relief.” Instead, it said “Reddit Answers doesn't provide answers to some questions, including those that are potentially unsafe or may be in violation of Reddit's policies.” After 404 Media first published this article, a Reddit spokesperson said that the company started implementing this update on Monday morning, and that it was not as a direct result of 404 Media reaching out.

The Reddit user who created the thread and flagged the issue to the company said they were concerned that Reddit Answers suggested dangerous medical advice in threads for medical subreddits, and that subreddit moderators didn’t have the option to disable Reddit Answers from appearing under conversations in their community.

“We’re currently testing out surfacing Answers on the conversation page to drive more adoption and engagement, and we are also testing core search integration to streamline the search experience,” a Reddit spokesperson told me in an email. “Similar to how Reddit search works, there is currently no way for mods to opt out of or exclude content from their communities from Answers. However, Reddit Answers doesn’t include all content on Reddit; for example, it excludes content from private, quarantined, and NSFW communities, as well as some mature topics.”

After we reached out for comment and the Reddit user flagged the issue to the company, Reddit introduced an update that would prevent Reddit Answers from being suggested under conversations about “sensitive topics.”

“We rolled out an update designed to address and resolve this specific issue,” the Reddit spokesperson said. “This update ensures that ‘Related Answers’ to sensitive topics, which may have been previously visible on the post detail page (also known as the conversation page), will no longer be displayed. This change has been implemented to enhance user experience and maintain appropriate content visibility within the platform.”

The dangerous medical advice from Reddit Answers is not surprising given that Google AI infamously suggesting users eat glue was also based on data sourced from Reddit. Google paid $60 million a year for that data, and has a similar deal with OpenAI as well. According to Bloomberg, Reddit is currently trying to negotiate even more profitable deals with both companies.

Reddit’s data is valuable as AI training data because it contains millions of user-generated conversations about a ton of esoteric topics, from how to caulk your shower to personal experiences with drugs. Clearly, that doesn’t mean a large language model will always usefully parse that data. The glue incident was caused because the LLM didn’t understand the Reddit user who was suggesting it was joking.

The risk is that people may take whatever advice an LLM gives them at face value, especially when it’s presented to them in the context of a medical subreddit. For example, we recently reported about someone who was hospitalized after ChatGPT told them they could replace their table salt with sodium bromide.

Update: This story has been updated with additional comment from Reddit.


#News


The plaintiffs claim that without the payment processors, which include CCBill, Epoch, and several others that process "high-risk" merchant payments, GirlsDoPorn would not have been a commercial enterprise to begin with.#girlsdoporn #payments #porn


GirlsDoPorn Victims Sue Major Payment Processors, Claiming They Enabled Sex Trafficking


Three victims of sex trafficking ring GirlsDoPorn brought a complaint against multiple companies that processed payments for the criminal organization, claiming that without their payment services, GirlsDoPorn would never have existed.

GirlsDoPorn was a criminal enterprise that coerced primarily high-school and college aged women with no experience in the adult industry into appearing in pornographic videos, by convincing them they were signing up for modeling gigs and telling them the videos would never be posted online. The ring was masterminded by Michael Pratt, who alongside multiple co-conspirators was charged with federal counts of sex trafficking by force, fraud and coercion in 2019. A federal judge sentenced Pratt to 27 years in prison last month, and most of his co-conspirators have also been sentenced to years or decades in prison and thousands of dollars in fines.

The lawsuit, brought by three women who appeared in the videos, seeks to become a class-action complaint on behalf of anyone who appeared in at least one pornographic video on GirlsDoPorn and its sister site GirlsDoToys between 2009 and 2019—which could include up to 300 more individuals, the complaint estimates. They allege that CCBill, Epoch, First Data Merchant Services, Total System Services, and a number of unnamed banks knowingly participated in GirlsDoPorn’s sex trafficking venture by providing it payment services.

Michael Pratt, GirlsDoPorn Ringleader, Sentenced to 27 Years in Prison
Michael James Pratt was sentenced to federal prison on charges of sex trafficking connected to the GirlsDoPorn crime ring. “He turned my pain into profit, my life into currency,” said one victim.
404 MediaSamantha Cole


The complaint was filed on Monday by several attorneys who’ve represented GirlsDoPorn victims since the civil case which went to trial in 2019. The defendant payment service companies generated “millions in fees for themselves and tens of millions for GirlsDoPorn,” the complaint claims. “By doing so, Defendants turned the victims’ sex acts into ‘commercial sex acts,’ a crucial element of sex trafficking under Section 1591 [the U.S. sex trafficking legal code]. Without Defendants’ payment network, GirlsDoPorn would have never been able to exist.”

CCBill is one of the most popular handlers of online porn payments and subscriptions. Epoch, another longtime service in the adult industry, was GirlsDoPorn’s payment facilitator, which acts as a gateway between credit card companies and merchants like porn sites. Total System Services and First Data were GirlsDoPorn’s payment processors, the complaint alleges, while the yet-unnamed banks settled the payments for GirlsDoPorn.

“Given the integral role of payment processing to the business of Internet pornography, GirlsDoPorn would never have become or remained a viable enterprise absent Defendants’ participation in the sex trafficking venture,” the plaintiffs argue. “GirlsDoPorn would never have achieved the level of success it did without Defendants actively assisting, supporting, and facilitating its unlawful business with streams of revenue.”

The plaintiffs claim that the defendants, as part of running their businesses, should have known GirlsDoPorn was a criminal enterprise, pointing to GirlsDoPorn’s own website and messaging as evidence: “Indeed, when it was launched, GirlsDoPorn’s website openly bragged about using fraud to lure a victim under the guise of a modeling advertisement—’She contacted us regarding an ad I had placed for beauty models wanted, having no idea it was actually for adult videos instead ha :)’” the complaint states. The plaintiffs also point to Reddit posts made by GirlsDoPorn victims talking about being abused, and the boasting GirlsDoPorn operators did on the website about how the women were “first-timers,” caught in their bait-and-switch scheme who would shoot porn for the “studio” exclusively, and weren’t part of the adult industry as a career choice.

“As the years went by, Defendants ignored dozens of red flags indicating GirlsDoPorn was a sex trafficking venture,” the complaint states. By 2017, they allege, defendants “could no longer feign ignorance of GirlsDoPorn’s illegal business practices” because the plantiffs served the defendants a subpoena as part of the civil case in San Diego seeking records related to GirlsDoPorn.

The defendants continued processing payments for the organization until October 2019, the plaintiffs claim, at which point everyone involved was arrested or indicted on federal sex trafficking charges and the websites went offline. “Only then did Defendants stop processing payments forGirlsDoPorn, but it was not by choice,” the complaint claims. “Any ignorance Defendants may have had to GirlsDoPorn’s illegal business practices prior to October 2019 is a direct result of Defendants’ own negligence, recklessness, or willful desire to remain ignorant, which is no defense under Section 1595.”

In addition to certifying the class action and a jury trial, the plaintiffs seek damages exceeding $1 million for each member of the class, restitution for what CCBill and Epoch earned from GirlsDoPorn, punitive damages, and attorney fees.

CCBill and Epoch did not respond to requests for comment. Fiserv, which owns First Data, and Total System Services did not immediately respond to comment requests.





Non ho parole... Certa gente dovrebbe avere il buon senso di autoestinguersi

liguriaoggi.it/2025/10/16/lors…



Videos demoing one of the sites have repeatedly gone viral on TikTok and other platforms recently. 404 Media verified they can locate specific peoples' Tinder profiles using their photo, and found that the viral videos are produced by paid creators.

Videos demoing one of the sites have repeatedly gone viral on TikTok and other platforms recently. 404 Media verified they can locate specific peoplesx27; Tinder profiles using their photo, and found that the viral videos are produced by paid creat…#News


Viral ‘Cheater Buster’ Sites Use Facial Recognition to Let Anyone Reveal Peoples’ Tinder Profiles


A number of easy to access websites use facial recognition to let partners, stalkers, or anyone else uncover specific peoples’ Tinder profiles, reveal their approximate physical location at points in time, and track changes to their profile including their photos, according to 404 Media’s tests.

Ordinarily it is not possible to search Tinder for a specific person. Instead, Tinder provides users potential matches based on the user’s own physical location. The tools on the sites 404 Media has found allow anyone to search for someone’s profile by uploading a photo of their face. The tools are invasive of anyone’s privacy, but present a significant risk to those who may need to avoid an abusive ex-partner or stalker. The sites mostly market these tools as a way to find out if their partner is cheating on them, or at minimum using dating apps like Tinder.

This post is for subscribers only


Become a member to get access to all content
Subscribe now


#News #x27


Oggi #16ottobre è la Giornata Mondiale della Rianimazione Cardiopolmonare. Al Salone dello Studente...

Oggi #16ottobre è la Giornata Mondiale della Rianimazione Cardiopolmonare. Al Salone dello Studente si stanno svolgendo le dimostrazioni di primo soccorso a cura di INAIL, nell’ambito della campagna ministeriale #MiStaiACuore volta a sensibilizzare #