La sfida curda ad Ankara. Il gen. Tricarico spiega perché è stata colpita l’industria della difesa
@Notizie dall'Italia e dal mondo
[quote]La Turchia è sempre stata un Paese vittima di attentati terroristici. Forse non così frequenti o regolari come in altri Paesi della regione, tuttavia Ankara si è sempre dovuta guardare da almeno due organizzazioni
Notizie dall'Italia e dal mondo reshared this.
La sfida curda ad Ankara. Il gen. Tricarico spiega perché è stata colpita l’industria della difesa
@Notizie dall'Italia e dal mondo
[quote]La Turchia è sempre stata un Paese vittima di attentati terroristici. Forse non così frequenti o regolari come in altri Paesi della regione, tuttavia Ankara si è sempre dovuta guardare da almeno due organizzazioni
Notizie dall'Italia e dal mondo reshared this.
Chinese Humanoid Robot Establishes New Running Speed Courtesy of Running Shoes
As natural as walking is to us tail-less bipedal mammals, the fact of the matter is that it took many evolutionary adaptations to make this act of controlled falling forward work (somewhat) reliably. It’s therefore little wonder that replicating bipedal walking (and running) in robotics is taking a while. Recently a Chinese humanoid robot managed to bump up the maximum running speed to 3.6 m/s (12.96 km/h), during a match between two of Robot Era’s STAR1 humanoid robots in the Gobi desert.
For comparison, the footspeed of humans during a marathon is around 20 km/h and significantly higher with a sprint. These humanoid robots did a 34 minute run, with an interesting difference being that one was equipped with running shoes, which helped it reach these faster speeds. Clearly the same reasons which has led humans to start adopting footwear since humankind’s hunter-gatherer days – including increased grip and traction – also apply to humanoid robots.
That said, it looks like the era when humans can no longer outrun humanoid robots is still a long time off.
youtube.com/embed/qw2y0kceAv0?…
Gazzetta del Cadavere reshared this.
Attenzione Italia! le false email di Namirial portano più guai di una Fattura Salata!
Il CERT-AGID ha rilevato recentemente una campagna malevola volta alla diffusione del trojan XWorm RAT, distribuito tramite false email camuffate da comunicazioni ufficiali del gestore Namirial.
L’email, redatta in italiano, invita l’utente a visualizzare un documento PDF allegato e, nel caso in cui il file non si apra correttamente, suggerisce di utilizzare un link alternativo presente nel corpo del messaggio.
Email utilizzata per la campagna XWorm RAT
In realtà, il file PDF funge da esca, poiché è protetto da password. Questo porta la vittima a cliccare sull’unico link alternativo disponibile che avvia il download di un archivio ZIP, ospitato su Dropbox, contenente un file URL. Da qui ha inizio la catena di compromissione.
PDF protetto da password
Il file URL sfrutta la funzionalità TryCloudflare che consente agli attaccanti di creare tunnel temporanei verso server locali e testare il servizio senza necessità di un account Cloudflare.
Ogni tunnel genera un sottodominio casuale sul dominio trycloudflare.com, utilizzato per instradare il traffico attraverso la rete di Cloudflare verso il server locale.
File su TryCloudflare
Il file URL procede quindi al download di un file BAT, offuscato tramite lo strumento BatchShield. Questo può essere facilmente deoffuscato utilizzando un tool specifico denominato BatchShield decryptor.
BAT Offuscato
BAT Deoffuscato
A questo punto, il procedimento è ben noto, essendo già stato osservato in campagne precedenti. Viene scaricato un ulteriore archivio ZIP contenente l’interprete Python, utilizzato per eseguire gli script malevoli già inclusi nell’archivio. Questo processo porta al rilascio di uno dei seguenti malware: AsyncRAT, DCRat, GuLoader, VenomRAT, Remcos RAT o, come nel caso attuale, XWorm.
Indicatori di Compromissione
Al fine di rendere pubblici i dettagli della campagna odierna si riportano di seguito gli IoC rilevati:
Link: Download IoC
L'articolo Attenzione Italia! le false email di Namirial portano più guai di una Fattura Salata! proviene da il blog della sicurezza informatica.
Divorzio sui Social Network! Chi ottiene la custodia dei follower?
Le controversie legali sulla divisione dei beni degli influencer dei social media si rivelano sempre più complesse e confuse. La situazione che Kat e Mike Stickler hanno dovuto affrontare dopo il divorzio è stata un esempio calzante. Uno dei maggiori asset dell’ex coppia, l’account “MikeAndKat” su TikTok e YouTube, ha attirato quasi 4 milioni di follower e nessuno sapeva come dividere equamente il profilo tra gli ex coniugi.
Secondo Kat, il giudice nel processo di divorzio non ha capito immediatamente come valutare il valore del conto, perché “questo è un settore completamente nuovo”. Il reddito principale della coppia, come quello di milioni di altri americani, proveniva dai social network, ma le loro attività sono più complesse del classico lavoro. Le pubblicazioni per un pubblico di milioni richiedono un’attenzione costante, poiché qualsiasi cambiamento nel contenuto può comportare la perdita di abbonati e, nel caso di una coppia, anche di reddito.
Gli avvocati che cercano di valutare il valore dei conti incontrano difficoltà molto maggiori rispetto alla divisione dei beni. Il successo di un account può dipendere direttamente da chi lo gestisce. In tribunale, Kat ha sottolineato che se il conto rimane con lei, continuerà a crescere. E Kat aveva ragione: dopo il divorzio ha cambiato il nome del canale in “KatStickler” e ha aumentato il numero di abbonati a quasi 10,5 milioni. Inoltre, la presenza di Kat su Instagram, YouTube e Facebook ha raggiunto un totale di 3 milioni di abbonati e le entrate derivanti dai suoi canali le hanno permesso di acquistare un appartamento e investire in una piccola impresa.
Mike ha un canale YouTube, che ora è praticamente inattivo, e lui stesso ora lavora nelle vendite.
L’industria degli influencer sulle piattaforme social sta crescendo rapidamente. Negli Stati Uniti, 27 milioni di persone lavorano come creatori di contenuti e per il 44% questa è la loro unica fonte di reddito. Il reddito principale di queste persone proviene da accordi pubblicitari e nel 2023 i marchi americani hanno pagato 26 miliardi di dollari per promuovere prodotti tramite i blogger. Allo stesso tempo, il valore dei conti tiene conto non solo dei redditi correnti, ma anche del loro potenziale, e ciascun coniuge deve giustificare il proprio ruolo in questo.
Quando gestiscono un account insieme, è difficile per gli ex coniugi valutare chi si è impegnato di più nella creazione del contenuto, chi ha avuto più idee o chi ha dedicato più tempo alla modifica. In alcuni casi, un partner è la forza trainante dell’intero account, il che complica notevolmente la procedura di sezione del profilo.
Il contenzioso tra individui ha portato all’emergere di nuovi approcci legali. Alcune coppie, come Reza e Pooja Khan, che condividono un pubblico di cinque milioni di persone, lo vedono come un progetto comune e preferiscono assumere consulenti finanziari per gestire il loro reddito in rapida crescita. Tuttavia, l’idea di dividere il loro “impero” rimane una prospettiva lontana.
La situazione può essere complicata per coloro che hanno reso popolari le relazioni personali o la vita familiare, poiché il divorzio cambia la percezione del pubblico e può avere un impatto negativo sugli affari. In alcuni casi, gli ex partner rinominano gli account per prendere le distanze dalla loro immagine passata, ma ciò comporta anche dei rischi.
Inoltre, una delle blogger, Vivian Tu, nota per i post sull’alfabetizzazione finanziaria, è consapevole della natura a breve termine di una carriera nei social network, che ricorda lo sport: la popolarità può essere persa a causa di cambiamenti negli algoritmi o della partenza del pubblico per altre tendenze. Tu si sta preparando alla vita fuori dalle piattaforme creando ulteriori fonti di reddito: scrivendo un libro e ospitando un podcast. Tu ha anche stipulato un accordo prematrimoniale che includeva i suoi conti per proteggere i suoi beni personali da potenziali controversie.
I contenziosi sulla divisione delle risorse nello spazio digitale dimostrano che i risultati di carriera nei social network oggi non sono inferiori alle tradizionali aree di business in termini di impatto sulla vita finanziaria e personale.
L'articolo Divorzio sui Social Network! Chi ottiene la custodia dei follower? proviene da il blog della sicurezza informatica.
Israele attacca l’Iran. Colpite basi militari a Teheran e in varie parti del paese
@Notizie dall'Italia e dal mondo
Tel Aviv ha dichiarato di aver preso di mira obiettivi militari e che questa è solo la prima fase della rappresaglia per l'attacco iraniano del 1° ottobre. L'Iran afferma di aver contrastato e respinto il raid. Non sono stati colpiti siti
like this
Notizie dall'Italia e dal mondo reshared this.
Atari’s Pac-Man Flop: How a Classic Went Off-Course
For fans of retro games, Pac-Man is nothing short of iconic—a game so loved it’s been ported to nearly every console imaginable. But the Atari 2600 version, released in 1982, left players scratching their heads – as laid out in a video by [Almost Something]. Atari had licensed Pac-Man to ride the wave of its arcade success, but the home version, programmed solely by [Todd Fry], missed the mark, turning an arcade icon into a surprising lesson in over-ambitious marketing.
Despite the hype, [Fry] faced an almost impossible task: translating Pac-Man’s detailed graphics and complex gameplay to the Atari’s limited 4 K cartridge with only 128 bytes of RAM. Atari’s strict limitations on black backgrounds and its choice to cut costs by sticking with a 4 K cartridge left the game barely recognizable. The famous pellet-chomping maze became simpler, colors were changed, and the iconic ghosts—reduced to single colors—flickered constantly. And then, Atari went all in, producing twelve million copies, betting on the success of universal appeal. In a twist, Pac-Man did sell in record numbers (over seven million copies) but still fell short of Atari’s expectations, leaving millions of unsold cartridges eventually dumped in a New Mexico landfill.
This debacle even kind of marked Atari’s 1983 decline. Still, Pac-Man survived the hiccup, evolving and outlasting its flawed adaptation on the 2600. If you’re interested in learning more about the ins and outs of game ports, check out the fantastic talk [Bob Hickman] gave during Supercon 2023.
youtube.com/embed/kgK22XF9FgQ?…
Retrotechtacular: Making Enough Merlins to Win a War
From the earliest days of warfare, it’s never been enough to be able to build a deadlier weapon than your enemy can. Making a sharper spear, an arrow that flies farther and straighter, or a more accurate rifle are all important, but if you can’t make a lot of those spears, arrows, or guns, their quality doesn’t matter. As the saying goes, quantity has a quality of its own.
That was the problem faced by Britain in the run-up to World War II. In the 1930s, Rolls-Royce had developed one of the finest pieces of engineering ever conceived: the Merlin engine. Planners knew they had something special in the supercharged V-12 engine, which would go on to power fighters such as the Supermarine Spitfire, and bombers like the Avro Lancaster and Hawker Hurricane. But, the engine would be needed in such numbers that an entire system would need to be built to produce enough of them to make a difference.
“Contribution to Victory,” a film that appears to date from the early 1950s, documents the expansive efforts of the Rolls-Royce corporation to ramp up Merlin engine production for World War II. Compiled from footage shot during the mid to late 1930s, the film details not just the exquisite mechanical engineering of the Merlin but how a web of enterprises was brought together under one vast, vertically integrated umbrella. Designing the engine and the infrastructure to produce it in massive numbers took place in parallel, which must have represented a huge gamble for Rolls-Royce and the Air Ministry. To manage that risk, Rolls-Royce designers made wooden scale models on the Merlin, to test fitment and look for potential interference problems before any castings were made or metal was cut. They also set up an experimental shop dedicated to looking at the processes of making each part, and how human factors could be streamlined to make it easier to manufacture the engines.
With prototype engines and processes in hand, Rolls-Royce embarked on a massive scale-up to production levels. They built huge plants in Crewe and Glasgow, hopefully as far from the Luftwaffe’s reach as possible. They also undertook a massive social engineering effort, building a network of training institutions tasked with churning out the millions of skilled workers needed. Entire towns were constructed to house the workers, and each factory had its own support services, including fire brigade and medical departments.
As fascinating as the engineering behind the engineering is, the film is still a love letter to the engine itself, of which almost 150,000 copies would eventually be manufactured. The casting processes are perhaps the most interesting, but there’s eye candy aplenty for Merlin fans at every stage of production. We were also surprised to learn that Rolls-Royce took the added step of mounting finished Merlins in the cowlings needed for the various planes they were destined for, to ensure that the engine would be properly integrated with the airframe. This must have been a huge boon to groundcrews out in the field; being able to bolt a new nose on a Spitfire and get it back in the fight with a spanking new Merlin was probably key to victory in the Battle of Britain.
youtube.com/embed/-fo7SmNuUU4?…
Israele attacca l’Iran. Esplosioni anche in Siria e Iraq
@Notizie dall'Italia e dal mondo
Tel Aviv ha dichiarato di aver colpito obiettivi militari. Almeno 5 esplosioni sono state registrate a Teheran, anche nei pressi dell’aeroporto
L'articolo Israele attacca l’Iran. Esplosioni pagineesteri.it/2024/10/26/med…
Notizie dall'Italia e dal mondo reshared this.
DIY 3D Hand Controller using a Webcam and Scripting
Are you ready to elevate your interactive possibilities without breaking the bank? If so, explore [Caio Bassetti]’s tutorial on creating a full 3D hand controller using only a webcam, MediaPipe Hands, and Three.js. This hack lets you transform a 2D screen into a fully interactive 3D scene—all with your hand movements. If you’re passionate about low-cost, accessible tech, try this yourself – not much else is needed but a webcam and a browser!
The magic of the project lies in using MediaPipe Hands to track key points on your hand, such as the middle finger and wrist, to calculate depth and positioning. Using clever Three.js tricks, the elements can be controlled on a 3D axis. This setup creates a responsive virtual controller, interpreting hand gestures for intuitive movement in the 3D space. The hack also implements a closed-fist gesture to grab and drag objects and detects collisions to add interactivity. It’s a simple, practical build and it performs reliably in most browsers.
For more on this innovation or other exciting DIY hand-tracking projects, browse our archive on gesture control projects, or check out the full article on Codrops. With tools such as MediaPipe and Three.js, turning ideas into reality gets more accessible than ever.
@RaccoonForFriendica new version 0.1.0-beta13 available!
Changelog:
🦝 migration to Material3 pull-to-refresh components;
🦝 moved app info to navigation bar and improve "About" dialog;
🦝 add open-source licences screen;
🦝 additional more readable font;
🦝 redesign application icon and splash screen;
🦝 add new l10ns (Polish and Portuguese);
🦝 fix spoiler closing immediately after being opened;
🦝 added experimental support to background notification check;
🦝 code refactoring and cleanup.
The icon change was made necessary because in order to display notifications in the status bar a small monochrome icon has to be provided and the old one has too many details. But since every cloud has a silver lining, this was the occasion to redesign a new one and, by combining it with the icon of the Lemmy app, create a logo for the Procyon project, i. e. the umbrella organization both clients belong to.
Have a great weekend and, remember, #livefasteattrash!
#raccoonforfriendica #procyonproject #opensource #fediverseapp #friendica #friendicadev #mobileapp #androidapp #androiddev #kotlin #multiplatform #kmp #compose #foss
like this
reshared this
Ex membri delle Forze Dell’ordine Italiane Sottraggono Dati Strategici Nazionali
Sei individui sono stati arrestati dai Carabinieri del Nucleo Investigativo di Varese, accusati di aver sottratto dati e informazioni classificate da diverse “Banche Dati Strategiche Nazionali“.
Tra queste informazioni sensibili di Sdi, Serpico, e Inps, esfiltrare per scopi economici e personali. A quattro di loro è stato imposto l’arresto domiciliare, mentre altri due sono stati soggetti a misure interdittive.
L’inchiesta è condotta dai magistrati Francesco De Tommasi e Gianluca Prisco della Direzione Distrettuale Antimafia di Milano, sotto la supervisione del procuratore Marcello Viola, come confermato da un comunicato della Procura.
Si ipotizza che le informazioni siano state trafugate su commissione e poi vendute, includendo dati riservati riguardanti anche esponenti politici.
Gli indagati, destinatari delle misure cautelari, comprenderebbero ex membri delle forze dell’ordine, hacker e consulenti informatici.
Sembrerebbe che tutte le attività che venivano svolte dal gruppo erano fatte su commissione e tra queste c’erano anche degli esponenti politici Non ancora precisare.
Per sabato 26 ottobre è convocata una conferenza stampa alla quale parteciperà anche il procuratore nazionale antimafia e antiterrorismo, Giovanni Melillo.
L'articolo Ex membri delle Forze Dell’ordine Italiane Sottraggono Dati Strategici Nazionali proviene da il blog della sicurezza informatica.
Can You Homebrew A Running Shoe?
Unless you spend all your time lounging on the sofa, you probably own at least one pair of shoes. But have you ever thought to make your own to improve some aspect of your life? YouTube channel Answer in Progress set out to do precisely that, but it didn’t quite work out.
When you (well, other people) get into running, it’s tempting to believe a lot of the shoe company hype and just drop hundreds of dollars on the latest ‘super shoe’ and hope that will help you break your target time. But do you actually need to buy into all this, or can you make something yourself? The project aimed to get the 5k time down significantly, at any cost, but primarily by cheating with technology. The team set out to look at the design process, given that there is indeed a fair amount of science to shoe design. Firstly, after a quick run, the main issues with some existing shoes were identified, specifically that there are a lot of pain points; feet hurt from all the impacts, and knees take a real pounding, too. That meant they needed to increase the sole cushioning. They felt that too much energy was wasted with the shoes not promoting forward motion as much as possible; feet tended to bounce upwards so that a rocker sole shape would help. Finally, laces and other upper sole features cause distraction and some comfort issues, so those can be deleted.
A thicker mid-sole allows for a rolled shape
The plan was to make a ‘sock’ shoe style, with an upper in one piece and stretchy enough to slip on without laces. The process started by wrapping the foot in cling film and then a few layers of duct tape to fix the shape. This was split down the top to extract the foot, open out the pattern, and transfer it to some nylon fabric. The outer profile was transferred and cut out with simple hand tools in a fashion that would allow the shape to be reconstructed as it was glued to a sole. It sounds simple, but it’s pretty fiddly work.
The latest running shoes use specialised rubber materials for the midsole. The solid foam wedge between the outer rubber and the inner sole cushions the foot. Those materials are only a few per cent ‘better’ than much more accessible foams that can be 3D printed. After sculpting a sole shape by hand using Blender, a friend 3D printed it. After that, the upper part was glued and ready for a test run. Which didn’t last long. It turned out that the lack of a stable heel counter (the bit around the back) that helps lock the heel in place meant the foot was too loose in the shoe, causing potential issues such as an ankle roll. That would be not good. A follow-up session with a sports-focused chiropodist demonstrated that all this was rather pointless before the fundamental issues of strength and fitness were addressed. So, whilst it was fun to see an attempt to beat the big boys at their own game, it sure isn’t easy to pull it off, especially if you can’t get off the sofa.
The invention of flexible 3D printing filaments spurred the development of a wide range of 3D-printed footwear, like these low-poly beauties. While we’re 3D printing shoes, we also need some lace locks. Finally, with winter approaching for us Northerners, perhaps it’s time to run off a pair of 3D-printed strap-on cleats.
youtube.com/embed/AiG_yD0Jf8Y?…
Thanks to [fluffy] for the tip!
Podcast: How Politician Turned Advocate Susanna Gibson Battles Non-Consensual Imagery
The former candidate for Virginia House of Delegates Susanna Gibson on how she went from full-time nurse, to running for office, to being targeted by non-consensual intimate imagery and harassment—and how her new model legislation and nonprofit are f…Samantha Cole (404 Media)
‘Upgrading’ a Microwave Oven To 20 kW
Whilst microwave plasmas are nothing new around here, we were curious to see what happens at 20x the power, and since YouTuber [Styropyro] had put out a new video, we couldn’t resist seeing where this was going. Clearly, as your bog standard microwave oven can only handle at most one kilowatt; the ‘oven’ needed a bit of an upgrade.A 16 kW water-cooled magnetron. Why not over-drive it to 20 kW for fun?
Getting hold of bigger magnetrons is tricky, but as luck — or perhaps fate — would have it, a 16 kW, water-cooled beast became available on eBay thanks to a tip from a Discord user. It was odd but perhaps not surprising that this Hitatch H0915 magnetron was being sold as a ‘heat exchanger.’
[Styropyro] doesn’t go into much detail on how to supply the anode with its specified 16 kW at 9.5 kVDC, but the usual sketchy (well down-right terrifying) transformers in the background indicate that he had just what was needed kicking around the ‘shop. Obviously, since this is a [Styropyro] video, these sorts of practical things have been discussed before, so there is no need to waste precious time and get right on to blowing stuff up!
Some classic microwave tricks are shown, like boiling water in five seconds, cooking pickles (they really do scream at 20 kW) and the grape-induced plasma-in-a-jar. It was quite clear that at this power level, containing that angry-looking plasma was quite a challenge. If it was permitted to leak out for only a few seconds, it destroyed the mica waveguide cover and risked coupling into the magnetron and frying it. Many experiments followed, a lot of which seemed to involve the production of toxic brown-colored nitrogen dioxide fumes. It was definitely good to see him wearing a respirator for this reason alone!Is it purple or is it indigo? Beauty is in the eye of the beholder!
The main star of the demonstration was the plasma-induced emissions of various metal elements, with the rare indigo and violet colors making an appearance once the right blend of materials was introduced into the glassware. Talking of glassware, we reckon he got through a whole kitchen’s worth. We lost count of the number of exploded beakers and smashed plates. Anyway, plasma science is fun science, but obviously, please don’t try any of this at home!
For those who didn’t take an ‘electron devices’ course at college, here’s a quick guide to how magnetrons work. Plasma physics is weird; here’s how the plasma grape experiment works. Finally, this old hack is a truly terrible idea. Really don’t do this.
youtube.com/embed/mg79n_ndR68?…
Una crociera/evento di dipendenti di Advance Cruise non attracca ad Amsterdam per una manifestazione di Extinction Rebellion.
Per "precauzione a causa di proteste previste per venerdì e sabato".
Ohhhhhhhhh. Che pericolosi questi Extinction Rebellion, che già in passato avevano bloccata la discesa di crocieristi incatenandosi a terra.
Pericolosissimi.
Da fermare con battaglioni di assalto? Forse meglio col lanciafiamme? Niente è abbastanza per questi terroristi!
/S
This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we talk about going viral, what we're watching lately, and a trip to Best Buy.
This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we talk about going viral, what wex27;re watching lately, and a trip to Best Buy.#BehindTheBlog
Behind the Blog: Perverse Virality
This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we talk about going viral, what we're watching lately, and a trip to Best Buy.Samantha Cole (404 Media)
Ham Radio in the Internet Age
Even if you are relatively young, you can probably think back on what TV was like when you were a kid and then realize that TV today is completely different. Most people watch on-demand. Saturday morning cartoons are gone, and high-definition digital signals are the norm. Many of those changes are a direct result of the Internet, which, of course, changed just about everything. Ham radio is no different. The ham radio of today has only a hazy resemblance to the ham radio of the past. I should know. I’ve been a ham for 47 years.
You know the meme about “what people think I do?” You could easily do that for ham radio operators. (Oh wait, of course, someone has done it.) The perception that hams are using antique equipment and talking about their health problems all day is a stereotype. There are many hams, and while some of them use old gear and some of them might be a little obsessed with their doctor visits, that’s true for any group. It turns out there is no “typical” ham, but modern tech, globalization, and the Internet have all changed the hobby no matter what part of it you enjoy.
Radios
One of the biggest changes in the hobby has been in the radio end. Hams tend to use two kinds of gear: HF and VHF/UHF (that’s high frequency, very high frequency, and ultra-high frequency). HF gear is made to talk over long distances, while VHF/UHF gear is for talking around town. It used to be that a new radio was a luxury that many hams couldn’t afford. You made do with surplus gear or used equipment.
Globalization has made radios much less expensive, while technological advances have made them vastly more capable. It wasn’t long ago that a handy-talkie (what normal folks would call a walkie-talkie) would be a large purchase and not have many features. Import radios are now sophisticated, often using SDR technology, and so cheap that they are practically disposable. They are so cheap now that many hams have multiples that they issue to other hams during public service events.
Because these cheap ($20-$40) radios often use SDR, they can even be hacked. These radios aren’t typically the highest quality if you are used to repurposed commercial gear, but when you can replace the radio for $20, it hardly matters.
HF radios are a different story. Thanks to software-defined radio, superpowerful computers, and FPGAs, even relatively inexpensive HF radios have features that would have seemed like magic when I first got my license.The ICOM IC-7300 is considered a “starter” radio!
While some hams like to build gear or use simple or older gear, modern transceivers, like the IC-7300 from Icom shown here, have incredible RF filtering done in software, spectrum analyzers, and scopes built in. The 7300, by the way, isn’t considered a “top of the line” radio by any means. But it has features that would have been a dream on a state of the art unit before the advent of DSP.
Having these kind of tools changes how you operate. In the old days, you’d tune around to see if you could hear anyone. Now, glancing at the screen will show you all the signals on a band and how strong they are. Touch one, and you tune it in immediately. Digital noise reduction is very helpful these days with so much interference, and, of course, you can control the whole thing from a PC if you want to.
The receivers are exceptional compared to what even a high-end radio would offer a few decades ago. Specialized filters used to be expensive and limited in options. Now, you can design any filter you want on the fly and it will be nearly perfect.
Granted, these radios aren’t in the impulse buy category like the handheld radios. Still, you can find them new for around $1,000 and used for less. There are also other similar radios for much less. Just as you can buy imported handheld VHF and UHF radios, there are imported HF radios that put out a lower wattage (20 watts vs 100 watts is typical). These still have plenty of features, and you can get them for about half the cost of the name-brand 100W rigs. [K4OGO] has a video (see below) about several popular radios in that price range and you’ll notice that many of them have similar displays.
youtube.com/embed/1lVU1eN1X_g?…
Digital Modes
Paradoxically, you might not need as hot a receiver, or as big of an antenna, or as much power as you might think. Hams have long known that voice communication is inefficient. Morse code could be the earliest form of digital radio communication, allowing a proficient operator to copy signals that would never make a voice contact. However, hams have also long used other digital modes, including TeleType, which is more convenient but less reliable than a good Morse code operator.
That changed with computer soundcards. Your computer can pull signals out of a hash that you would swear was nothing but noise. Modern protocols incorporate error detection and correction, retries, and sophisticated digital signal processing techniques to pull information from what appears to be nowhere.
What kind of sound card do you need? Almost any modern card will do it, but if you have the Icom IC-7300 pictured above, you don’t need one. It turns out, it is a sound card itself. When you plug it into a PC, it offers audio in and out for ham radio programs. It can even send IQ signals directly to the PC for common SDR programs to work with.
Some digital modes are conversational. You can use them like you might a radio-based chat room to talk to people you know or people you’ve just met. However, some modes are more specialized and optimized to make and confirm contact.
Computer Logging
There was a time when every ham had a log book — a notebook to write down contacts — and a stack of QSL cards. Operators would exchange cards in the mail to confirm contact with each other. Many of the cards were interesting, and collecting enough cards could earn an award (for example, working all 50 US states or over 100 foreign countries).
Things are different now. Many people use a computer to track their contacts. While you could just use a spreadsheet, there are many ways to log and — more importantly — share logs online.
The advantage is that when you make a contact and enter into the system, it can match your entry up with your partner’s entry and immediately confirm the contact. This isn’t perfect, because there are several systems people use, but it is possible to interoperate between them. No more waiting for the mail.
DX and Propagation
I mentioned that having a display of the entire ham band changes how you operate. But there is even more help out there. Many people enjoy working rare foreign stations or special event stations held at parks or historical locations. These days, if you hear a station like that on the air, you can report it on the Internet so other people can find them. In some cases, the operator will report themselves, even.A real-time view of beacon reception across the globe.
Suppose you want to make contact with someone in Kenya because you haven’t done it, and you are working towards an award that counts how many countries you’ve contacted. Instead of searching endlessly, you can simply watch the Internet for when a station from that country appears. Then turn on your radio, use the digital tuning to go exactly to their frequency, and try your luck.
Of course, radio propagation isn’t foolproof. But you can use beacons to determine how propagation is near you. There are many tools to manipulate the beacon data to better understand radio conditions. In fact, if you use digital modes or Morse code, you can find out who’s hearing you on the Internet, which can be very useful.
Why Not You?
Some old hams say the Internet is ruining ham radio. I say it is changing ham radio just like it has changed virtually everything else. Some of those changes aren’t that drastic anyway. For years, people chasing awards, trying to work long distances, or participating in contests have very short contacts. You typically would exchange your name, location, and how strong your signal is and then make way for the next person to make contact. The digital mode FT8 automates all that. It is true that it isn’t very personal, but those kinds of contacts were never personal to start with.
What’s more is that you don’t have to use any of this if you don’t want to. I operate a lot of Morse code with no mechanical assistance. If I hear a big pileup, I might go look at the computer to see who has been spotted on that frequency. But I don’t have to. I could figure it out the old-fashioned way.
Hams work with advanced signal processing software, satellites, moon bounce, support communities, design antennas, foster school education, work during disasters, and push the envelope on microwave communication. No matter what your interests, there’s something you’ll enjoy doing. For many years now, you don’t even have to pass a test for Morse code, so if you didn’t want to learn the code, you don’t have to.
In many ways, hams were the original hackers, and you might be surprised by how many hackers you know who are hams already. I don’t know what ham radio will look like in the year 2100, but I know it will be pushing the limits of technology, somehow.
Hackaday Podcast Episode 294: SAO Badge Reveal, Precision on a Shoestring, and the Saga of Redbox
With the 2024 Hackaday Supercon looming large on the horizon, Editors Elliot Williams and Tom Nardi start this episode off by talking about this year’s badge and its focus on modular add-ons. From there they’ll go over the results of a particularly challenging installment of What’s that Sound?, discuss a promising DIY lathe that utilizes 3D printed parts filled with concrete, and ponder what the implosion of Redbox means for all of their disc-dispensing machines that are still out in the wild.
You’ll also hear about custom macropads, lifting SMD pins, and how one hacker is making music with vintage electronics learning kits. Finally, they’ll reassure listeners that the shifting geopolitical landscape probably won’t mean the end of Hackaday.io anytime soon, and how some strategically placed pin headers can completely change how you approach designing your own PCBs.
Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!
html5-player.libsyn.com/embed/…
Where to Follow Hackaday Podcast
Places to follow Hackaday podcasts:
Episode 294 Show Notes:
News:
What’s that Sound?
- Congrats to [I can see the sounds] for guessing the HAARP.
Interesting Hacks of the Week:
- A 3D Printed, Open Source Lathe?
- Redbox Is Dead, But The Machines Are Kind Of Hanging On
- Redbox hack reveals customer info. from 2K rentals – Ars Technica
- Foone
: “the unit I’ve got an image for has records going …” – digipres.club
- Libre Space Foundation Aims To Improve Satellite Tech
- Flying The First Open Source Satellite
- 32C3: So You Want To Build A Satellite?
- Open Source CubeSats Ease The Pain Of Building Your Own
- How To Build A CubeSat
- SatNOGS – Global Network of Ground Stations
- Keeping Tabs On An Undergraduate Projects Lab’s Door Status
- DIY Air Bearings, No Machining Required
- I2C The Hard Way
Quick Hacks:
- Elliot’s Picks:
- 3D Printed Tires, By The Numbers
- Zero To Custom MacroPad In 37 Easy Steps
- Make Your Own Remy The Rat This Halloween
- Tom’s Picks:
- Give Your SMD Components A Lift
- 75-In-One Music
- Figuring Out The Most Efficient Way To Reuse Bags Of Desiccant
Can’t-Miss Articles:
hackaday.com/2024/10/25/hackad…
Il DNA Come Un Hard Disk! 215.000 Terabyte Possono Essere Archiviati In Una Sola Molecola
Un gruppo di scienziati ha sviluppato un metodo per registrare informazioni digitali sulle molecole di DNA che è 350 volte più veloce della tecnologia esistente. Lo studio dimostra un nuovo modo di archiviare i dati utilizzando la modifica epigenetica del DNA. Gli esperti sono fiduciosi che questa tecnologia possa aprire la strada alla creazione di sistemi biomolecolari per l’archiviazione reale delle informazioni.
Sulla base della ricerca, gli scienziati affermano che una molecola di DNA umano può potenzialmente immagazzinare fino a 215.000 terabyte di informazioni, il che ha da tempo attirato l’attenzione della comunità scientifica sul DNA come promettente vettore di dati digitali.
a , Illustrazione del meccanismo di memorizzazione delle informazioni epigenetiche. b , Schema per la programmazione di tipi mobili di DNA. c , Composizione tipografica programmabile di autoassemblaggio di DNA. Le informazioni di modifica vengono composte programmando tipi mobili di DNA che trasportano specifici epi-bit. d , La stampa parallela viene eseguita dalla catalisi DNMT1 guidata dall’autoassemblaggio di DNA per scrivere selettivamente epi-bit sui modelli di DNA. e , Sequenziamento di nanopori di modelli modificati e chiamata di metilazione collettiva. (Fonte Archiviazione parallela di dati molecolari mediante stampa di bit epigenetici sul DNA)
Rimangono due ostacoli principali sulla strada verso il pieno utilizzo del DNA per immagazzinare informazioni. Innanzitutto il costo di produzione. Oggi l’unico modo possibile per registrare i dati è la sintesi del DNA nelle fabbriche, ma questo approccio è troppo costoso per un uso di massa. La seconda difficoltà è la bassa velocità dei processi di codifica delle informazioni nelle molecole.
L’approccio proposto ci consente di risolvere entrambi i problemi utilizzando meccanismi naturali che accelerano notevolmente il processo. Il metodo si basa sulla metilazione delle basi azotate su uno stampo di DNA già esistente. Ciò elimina la necessità di sintesi e consente la registrazione dei dati ad alta velocità, che i ricercatori chiamano epi-bit, un analogo dei bit nei computer digitali convenzionali.
La metilazione, o la sua mancanza, consente di rappresentare le unità di dati come 1 e 0. I test hanno dimostrato che il nuovo metodo è in grado di registrare dati a una velocità di 350 bit per reazione, un miglioramento significativo rispetto agli approcci precedenti che fornivano solo un bit. per reazione.
Oltre ad aumentare la produttività, gli scienziati hanno anche migliorato l’usabilità delle unità DNA creando la piattaforma iDNAdrive. Circa 60 volontari provenienti da diversi campi scientifici hanno codificato con successo circa 5.000 bit di informazioni di testo sulla piattaforma.
Tuttavia, la tecnologia è ancora inferiore ai metodi di archiviazione tradizionali. Anche con l’uso di epi-bit e di una piattaforma automatizzata di elaborazione liquida, la velocità di scrittura dei dati raggiunge solo 40 bit al secondo (le unità SSD possono leggere e scrivere dati a velocità di 200-550 MB/s).
I ricercatori sollevano anche domande sulla durabilità delle etichette metiliche create dalla nuova tecnologia. Inoltre, c’è il problema di implementare un accesso casuale ai dati simile alla RAM: l’accesso selettivo ai file nel sistema epi-bit richiede la lettura dell’intero database, il che è inefficiente con il sequenziamento dei nanopori.
Il costo della tecnologia epi-bit supera finora il costo dei tradizionali sistemi di archiviazione basati sul DNA. Tuttavia, gli scienziati sperano che un’ulteriore automazione e ottimizzazione contribuiranno a ridurre i costi e ad avvicinare la commercializzazione.
L'articolo Il DNA Come Un Hard Disk! 215.000 Terabyte Possono Essere Archiviati In Una Sola Molecola proviene da il blog della sicurezza informatica.
Stasera su RAI STORIA: alla fine della Seconda Guerra mondiale, l’Italia sconfitta è condannata a fermarsi alle porte di Trieste
La città stretta tra il mare e il Carso diventa oggetto di una lunga e contrastata questione confinaria con la Jugoslavia. Sullo sfondo della Guerra Fredda, il possesso di Trieste assume un significato al contempo politico, strategico e simbolico: è l’emblema dei movimenti nazionali e degli irredentismi sloveno e italiano; rappresenta la porta sul Mediterraneo a disposizione del blocco socialista che progressivamente si profila nell’Europa centro-orientale; e infine, per gli Stati Uniti e il Regno Unito, costituisce l’antemurale dell’Occidente, essenziale ad assicurare la penisola alla loro sfera d’influenza.
Una pagina raccontata, dai luoghi della storia, da #CarlaOppo e, in studio, con #PaoloMieli, dal professor #RaoulPupo.
⏰ Appuntamento alle 20.30 su #RaiStoria. Si rivede su @RaiPlay.
venerdì #25ottobre
Storia reshared this.
Donated Atari Mega ST Gives a Peek at Game Development History
[Neil] from The Cave, a computer and console gaming museum in the UK, has a treat for vintage computing and computer gaming enthusiasts. They received an important piece of game dev history from [Richard Costello], who coded ports of Gauntlet 2, Mortal Kombat, and Primal Rage for Atari ST and Amiga home computers in the 80s. [Richard] brought them his non-functional Atari Mega ST in the hopes that they could get it working again, and demonstrate to visitors how game development was done back in the 80s — but sadly the hardware is not in the best shape.The Atari ST flagged deleted files for overwriting but didn’t actively wipe them, allowing an undelete utility to work.
That doesn’t stop [Neil], however. The real goal is seeing if it’s possible to re-create the development environment and access the game assets on the SCSI hard drive, and it’s not necessary to revive every part of the hardware to do that. The solution is to back up the drive using a BlueSCSI board which can act as a host, scan the SCSI bus, and dump any device it finds to an SD card. The drive didn’t spin up originally, but some light percussive maintenance solved that.
With the files pulled off the drive, it was time to boot it up using an emulator (which begins at the 16:12 mark). There are multiple partitions, but not a lot of files. There was one more trick up [Neil]’s sleeve. Suspecting that deleting everything was the last thing [Richard] did before turning the machine off decades ago, he fired up a file recovery utility. The Atari ST “deleted” files by marking them to be overwritten by replacing the first letter of the filename with a ‘bomb’ character but otherwise leaving contents intact. Lo and behold, directories and files were available to be undeleted!
[Neil] found some fascinating stuff such as mixed game and concept assets as well as what appears to be a copy of Ramrod, a never-released game. It’s an ongoing process, but with any luck, the tools and environment a game developer used in the 80s will be made available for visitors to experience.
Of course, modern retro gaming enthusiasts don’t need to create games the classic way; tools like GB Studio make development much easier. And speaking of hidden cleverness in old games, did you know the original DOOM actually had multi-monitor support hidden under the hood?
youtube.com/embed/kEYqpvXdpec?…
Twister was one of the first DVDs ever released. Now it's stuck in still-functioning Redbox machines.
Twister was one of the first DVDs ever released. Now itx27;s stuck in still-functioning Redbox machines.#Redbox #Twister
Redbox's Last DVD: 'Twister' Is Unrentable in Remaining Redbox Kiosks and No One Knows Why
Twister was one of the first DVDs ever released. Now it's stuck in still-functioning Redbox machines.Jason Koebler (404 Media)
This Week in Security: The Geopolitical Kernel, Roundcube, and The Archive
Leading off the week is the controversy around the Linux kernel and an unexpected change in maintainership. The exact change was that over a dozen developers with ties to or employment by Russian entities were removed as maintainers. The unfortunate thing about this patch was that it was merged without any discussion or real explanation, other than being “due to various compliance requirements”. We eventually got more answers, that this was due to US sanctions against certain Russian businesses, and that the Linux Foundation lawyers gave guidance that:
If your company is on the U.S. OFAC SDN lists, subject to an OFAC sanctions program, or owned/controlled by a company on the list, our ability to collaborate with you will be subject to restrictions, and you cannot be in the MAINTAINERS file.
So that’s that. One might observe that it’s unfortunate that a single government has that much control over the kernel’s development process. There were some questions about why Russian entities were targeted and not sanctioned Chinese companies like Huawei. [Ted Ts’o] spoke to that, explaining that in the US there are exemptions and different rules for each country and business. This was all fairly standard compliance stuff, up until a very surprising statement from [James Bottomley], a very core Kernel maintainer:
We are hoping that this action alone will be sufficient to satisfy the US Treasury department in charge of sanctions and we won’t also have to remove any existing patches.
I can only conclude from this that the US Treasury has in fact made this threat, that code would need to be removed. Now this is genuinely surprising, given the legal precedent that code is 1st Amendment protected speech. That precedent was established when dealing with encryption code that was being export restricted in the 90s. It seems particularly problematic that the US government believes it can specify what code does and does not belong in the Linux kernel.
SELinux
Since we’re in Kernel land, let’s talk SELinux. Many modern Linux systems, and Android in particular, use SELinux to provide an extra security layer. It’s not an uncommon troubleshooting step, to turn off SELinux to see if that helps with mysterious issues. What we have here in the klecko Blog is an intro to bypassing SELinux. The setup is that an exploit has achieved root, but is in a unprivileged context. What options does an attacker have to try to bypass SELinux?
The first, most obvious solution is to just disable SELinux altogether. If you can write to memory, the SELinux enabled bit can just be set to false. But that might not work, if you can’t write to memory, or have a hypervisor to wrestle with, like some Android systems. Another option is the set of permissive flags that can be overwritten, or the AVC cache that can be poisoned, both approaches resulting in every SELinux request being approved. It’s an interesting overview.
Printer Root
Xerox printers with the “Network Troubleshooting” feature have some unintended hidden functionality. The troubleshooting is done by calling tcpdump as root, and the configuration allows setting the IP address to use for the troubleshooting process. And as you might expect, that IP address was used to create a command line string, and it isn’t properly escaped. You can sneak a $(bash ...)
in as part of the address, allowing code execution. The good news is that access to this troubleshooting function is locked behind the web admin account. Xerox has made fixed firmware available for this issue.
Fix Your Roundcube
The Roundcube email web client has a Cross-Site Scripting (XSS) vulnerability that is actively being exploited. The flaw is the processing of SVGs, and the addition of an extra space in an href
tag, that the browser ignores. Sneaking this inside an SVG allows for arbitrary Javascript to run when opening this malicious email.
Roundcube has released 1.5.7 and 1.6.7 that address the issue. This is under active exploitation, currently being used against the Russian aligned CIS countries. It’s a simple exploit, so expect to see it more widely used soon.
The Archive
The Internet Archive continues to be under siege. The Distributed Denial of Service (DDoS) attacks were apparently done by SN-Blackmeta. But the hacker behind the data breach is still a mystery. But the news this week is that there is still someone with access to Internet Archive API keys. Specifically Zendesk, illustrated by the fact that when Mashable reached out via email, the hacker answered, “It’s dispiriting to see that even after being made aware of the breach 2 weeks ago, IA has still not done the due diligence of rotating many of the API keys that were exposed in their gitlab secrets.”
It’s obviously been a terrible, horrible, no good, and very bad month for the Internet Archive. As it’s such an important resource, we’re hoping for some additional support, and getting the service back to 100%.
Quantum Errata
You may remember last week, that we talked about a Quantum Annealing machine making progress on solving RSA cryptography. In the comments, it was pointed out that some coverage on this talks about RSA, and some talks about AES, a cryptography thought to be quantum-resistant. At least one source is claiming that this confusion is because there were actually two papers from the same team, one discussing RSA, and the other techniques that could be used against AES. This isn’t confirmed yet, and there are outstanding questions about both papers.
Bits and Bytes
SQL injection attacks are old hat by this point. [NastyStereo] has an interesting idea: Polyglot SQL injection attacks. The idea is simple. A SQL query might be escapable with a single quote or a double quote. To test it, just include both: OR 1#"OR"'OR''='"="'OR''='
. There are more examples and some analysis at the link.
Kaspersky researchers found a Chrome exploit, that was being delivered in the form of an online tank battle game. In reality, the game was stolen from its original developers, and the web site was a crypto stealing scam, making use of the browser 0-day. This campaign has been pinned on Lazarus, the APT from North Korea.
And yet another example of fake software, researchers at kandji discovered a fake Cloudflare Authenticator campaign. This one is a MacOS malware dropper that does a reasonably good job of looking like it’s an official Cloudflare app. It’s malware, and places itself in the system crontab, to get launched on every boot. Follow the link for Indicators of Compromise if you need them.
Il World Media Summit Si è Concluso in Cina: Il Vertice dei Media, Tra AI, Ombre e Diritti Umani
Questa settimana, la Cina ha ospitato il sesto World Media Summit a Urumqi, capitale dello Xinjiang, con oltre 500 partecipanti da 208 importanti organizzazioni mediatiche. L’evento, organizzato in collaborazione con l’agenzia di stampa statale Xinhua e il governo locale, ha avuto come tema centrale “Intelligenza Artificiale e Trasformazione dei Media“. Tuttavia, la scelta dello Xinjiang come sede ha suscitato ampie critiche a causa delle preoccupazioni internazionali per le presunte violazioni dei diritti umani nella regione.
Adrian Zenz, direttore degli studi sulla Cina presso la Victims of Communism Memorial Foundation, ha messo in discussione le vere intenzioni del vertice, suggerendo che l’evento potrebbe servire a distrarre l’attenzione globale dalle questioni legate ai diritti umani nello Xinjiang. Ha evidenziato come la Cina stia cercando di normalizzare la situazione nella regione, presentandola come un centro per la discussione su tecnologia e sviluppo.
Le accuse di violazioni dei diritti umani nello Xinjiang continuano a essere gravi, con oltre 1 milione di uiguri e altre minoranze turche detenuti in campi di rieducazione. Gli Stati Uniti hanno descritto queste azioni come un “genocidio”, imponendo sanzioni a funzionari e aziende coinvolte. La Cina ha negato tali accuse, definendo i campi come centri di formazione professionale.
All’evento, alcuni partecipanti hanno difeso la Cina, rifiutando le accuse di violazioni dei diritti umani come “fake news”. Waref Komaiha, del Silk Road Research Institute, ha descritto lo sviluppo nello Xinjiang come sorprendente e contraddittorio rispetto alle notizie false diffuse sui media. Ling Sze Gan di Reuters ha enfatizzato il potenziale dell’intelligenza artificiale generativa per migliorare il lavoro dei giornalisti.
Gli attivisti uiguri hanno condannato il vertice, vedendolo come un tentativo di legittimare le politiche cinesi nella regione. Mamtimin Ala, presidente del governo del Turkestan orientale a Washington, ha espresso delusione per la partecipazione di organizzazioni mediatiche rispettate, ritenendola una legittimazione delle politiche coloniali cinesi.
In sintesi, il World Media Summit ha sollevato interrogativi sulla reale intenzione della Cina di affrontare le questioni legate ai diritti umani, mentre le accuse di violazioni rimangono al centro dell’attenzione internazionale. La legittimazione delle politiche cinesi attraverso la partecipazione di media internazionali ha generato forti reazioni da parte degli attivisti uiguri e preoccupazioni per la manipolazione dell’informazione.
La situazione nello Xinjiang continua a essere un tema delicato e controverso, con tensioni crescenti tra la narrativa cinese e le accuse di violazioni sistematiche dei diritti umani.
L'articolo Il World Media Summit Si è Concluso in Cina: Il Vertice dei Media, Tra AI, Ombre e Diritti Umani proviene da il blog della sicurezza informatica.
Francesco Spano: “Quel contratto a mio marito non c’entra con le mie dimissioni, hanno fatto di me una macchietta”
@Politica interna, europea e internazionale
“C’è stato un attacco alla mia vita privata e alle mie scelte”. Così Francesco Spano motiva la sua decisione di dimettersi da capo di gabinetto del ministro della Cultura Alessandro Giuli. Spano ne parla oggi, venerdì 25 ottobre, in due interviste
𝔻𝕚𝕖𝕘𝕠 🦝🧑🏻💻🍕 likes this.
reshared this
Il PKK rivendica l’attacco all’agenzia spaziale turca
@Notizie dall'Italia e dal mondo
Proprio mentre si apre uno spiraglio di trattativa, il PKK curdo rivendica l'assalto all'agenzia spaziale turca che produce i droni e i caccia usati per bombardare le basi della guerriglia
L'articolo Il PKK rivendica l’attacco pagineesteri.it/2024/10/25/asi…
Notizie dall'Italia e dal mondo reshared this.
La mostra sul futurismo e il curatore che si paragona a Boccia: ecco cos’altro rivelerà Report sul Ministero della Cultura
@Politica interna, europea e internazionale
Ci sarebbe la mostra sul futurismo in programma alla Gnam, la Galleria nazionale d’arte moderna di Roma, al centro del “secondo caso Boccia” che il programma tv Report – come annunciato dal conduttore Sigfrido
reshared this
Recensione : THURSTON MOORE – FLOW CRITICAL LUCIDITY
THURSTON MOORE - FLOW CRITICAL LUCIDITY
THURSTON MOORE - FLOW CRITICAL LUCIDITY - Thurston Moore - Flow critical lucidity: il 20 settembre ha pubblicato il suo nuovo (e, complessivamente, nono) album, "Flow critical lucidity" attraverso la Daydream Library Series, house label della communi…Reverend Shit-Man (In Your Eyes ezine)
Musica Agorà reshared this.
A Birthday Cake for a Retrocomputer Designer
When making a birthday cake a bit more personal, one can create a novelty themed confection appropriate for the lucky recipient. In the case of [Spencer Owen], who you may know as the creator of the RC2014 retrocomputing ecosystem, it was appropriate to have one of the little machines at work somewhere, so [peahen] did just that. The result is a cake in the shape of an IMSAI 8080 microcomputer, but it does more than just look the part. This is a working replica of the classic machine, powered as you might expect by an RC2014 sitting next to it.
The lights are a set of addressable LEDs, and the switches are made from appropriately colored sweets. Sadly the plan to make these capacitive touch switched failed as the wiring became buried in the icing, but the LEDs deserve a second look. They’re encased in translucent heatshrink sleeving which is embedded under a layer of white icing, which is translucent enough, but on top for the classic panel light look are a set of edible cake-maker’s jewels. Best of all while all except the electronics is edible, the front panel is robust enough to have been removed from the cake in one and thus will live on.
We rather like the idea of electronics meeting sugarcraft, because fondant is a surprisingly versatile medium that deserves attention much further than just confectionery. We remember it being a popular cheap way to experiment with 3D printing back at the dawn of open source printers, and it still has some potential. Meanwhile if you’ve not seen the RC2014 we reviewed its original version back in 2016, and since then it’s evolved to become an ecosystem in its own right.
Dual use, Fincantieri guida l’innovazione con una nuova struttura negli Usa
@Notizie dall'Italia e dal mondo
[quote]Mai come oggi l’innovazione rappresenta un asset indispensabile per lo sviluppo di soluzioni tecnologiche. In un contesto caratterizzato da una sempre maggiore complessità, la collaborazione tra partner rende possibile accelerare lo sviluppo di tecnologie allo
Notizie dall'Italia e dal mondo reshared this.
Il commissario designato irlandese McGrath delinea la sua agenda per una democrazia di fronte alla transizione digitale
L'articolo proviene da #Euractiv Italia ed è stato ricondiviso sulla comunità Lemmy @Intelligenza Artificiale
Il commissario designato per la Democrazia, la Giustizia e lo Stato di Diritto
Intelligenza Artificiale reshared this.
STATI UNITI. Elezioni: perché Kamala Harris e Donald Trump non parlano di armi nucleari?
@Notizie dall'Italia e dal mondo
Perché Kamal Harris e Donald Trump non parlano di armi atomiche e disarmo nucleare? Le armi di distruzione di massa hanno causato danni gravi agli americani, specie ai Nativi. La loro manutenzione costerà 756 miliardi di dollari nel
Notizie dall'Italia e dal mondo reshared this.
Putting the New CryoGrip Build Plate to the Test
Bambu Lab has released a new line of low-temperature build plates that look to be the next step in 3D printing’s iteration—or so YouTuber Printing Perspective thinks after reviewing one. The Cryogrip Pro is designed for the Bambu X1, P1, and A1 series of printers but could easily be adapted for other magnetic-bed machines.The bed adhesion strength when cold is immense!
The idea of the new material is to reduce the need for high bed temperatures, keeping enclosure temperatures low. As some enclosed printer owners may know, trying to print PLA and even PETG with the door closed can be troublesome due to how slowly these materials cool. Too high an ambient temperature can wreak havoc with this cooling process, even leading to nozzle-clogging.
The new build plate purports to enable low, even ambient bed temperatures, still with maximum adhesion. Two versions are available, with the ‘frostbite’ version intended for only PLA and PETG but having the best adhesion properties. A more general-purpose version, the ‘glacier’ sacrifices a little bed adhesion but gains the ability to handle a much wider range of materials.
An initial test with a decent-sized print showed that the bed adhesion was excellent, but after removing the print, it still looked warped. The theory was that it was due to how consistently the magnetic build plate was attached to the printer bed plate, which was now the limiting factor. Switching to a different printer seemed to ‘fix’ that issue, but that was really only needed to continue the build plate review.
They demonstrated a common issue with high-grip build plates: what happens when you try to remove the print. Obviously, magnetic build plates are designed to be removed and flexed to pop off the print, and this one is no different. The extreme adhesion, even at ambient temperature, does mean it’s even more essential to flex that plate, and thin prints will be troublesome. We guess that if these plates allow the door to be kept closed, then there are quite a few advantages, namely lower operating noise and improved filtration to keep those nasty nanoparticles in check. And low bed temperatures mean lower energy consumption, which is got to be a good thing. Don’t underestimate how much power that beefy bed heater needs!
Ever wondered what mini QR-code-like tags are on the high-end build plates? We’ve got the answer. And now that you’ve got a pile of different build plates, how do you store them and keep them clean? With this neat gadget!
youtube.com/embed/PnEVPNdFouQ?…
Deceptive Delight: l’AI nuovamente ingannata da una tecnica di hacking con il 65% di Successo
Gli esperti di Palo Alto Networks hanno sviluppato una tecnica innovativa chiamata “Deceptive Delight” per bypassare i meccanismi di difesa dei modelli di intelligenza artificiale (AI) linguistica. Questa tecnica, che unisce contenuti sicuri e non sicuri in un contesto apparentemente innocuo, inganna i modelli spingendoli a generare risposte potenzialmente dannose. Lo studio ha coinvolto circa 8.000 test su otto modelli diversi, evidenziando una vulnerabilità diffusa a questo tipo di attacchi.
“Deceptive Delight” sfrutta una strategia multi-pass, dove richieste non sicure vengono inserite tra due richieste sicure. In questo modo, il modello AI non percepisce il contenuto come una minaccia, continuando a generare risposte senza attivare i filtri di sicurezza.
L’attacco ha un tasso di successo del 65% in sole tre iterazioni, dimostrando la sua elevata efficacia nel bypassare i filtri standard.
Il processo di attacco si suddivide in tre fasi: preparazione, query iniziale, e approfondimento degli argomenti. In particolare, la terza fase, in cui si richiede un’ulteriore espansione del contenuto, è quella in cui i modelli iniziano a generare dettagli non sicuri in maniera più specifica, confermando l’efficacia della tecnica multi-percorso. Con questa metodologia, il tasso di successo aumenta sensibilmente rispetto agli attacchi diretti.
Gli attacchi hanno avuto successo variabile a seconda della categoria del contenuto non sicuro. I modelli sono risultati più vulnerabili a richieste legate alla violenza e agli atti pericolosi, mentre le risposte relative a contenuti sessuali e incitazioni all’odio sono state gestite con maggiore attenzione. Questa differenza suggerisce una maggiore sensibilità dei modelli verso alcune categorie di contenuti.
Palo Alto Networks ha inoltre sottolineato l’importanza di una progettazione delle query più strutturata e di soluzioni multi-livello per il filtraggio dei contenuti. Tra le raccomandazioni rientrano l’adozione di servizi come OpenAI Moderation e Meta Llama-Guard, insieme a test regolari sui modelli per rafforzare i sistemi di difesa e ridurre le vulnerabilità.
I risultati di questa ricerca sono stati condivisi con la Cyber Threat Alliance (CTA) per una rapida implementazione di misure preventive. Palo Alto sottolinea che il problema, pur evidenziando punti deboli nell’attuale tecnologia AI, non mina la sicurezza dei modelli in generale, ma sottolinea la necessità di miglioramenti continui per affrontare nuove minacce.
L'articolo Deceptive Delight: l’AI nuovamente ingannata da una tecnica di hacking con il 65% di Successo proviene da il blog della sicurezza informatica.
OPERAZIONE OPSON 2024. UNO SFORZO CONGIUNTO
Europol, OLAF, DG SANTE, DG AGRI e 29 paesi in tutta Europa, nonché produttori di alimenti e bevande del settore privato, hanno unito le forze nell’edizione 2024 dell’operazione OPSON. Questa operazione annuale, giunta alla sua tredicesima edizione, prende di mira cibi e bevande contraffatti e di scarsa qualità. Forze dell'ordine, dogane, e le agenzie di regolamentazione alimentare hanno sequestrato circa 22.000 tonnellate di cibo e circa 850.000 litri di bevande (per lo più alcoliche).
La frode alimentare, la contraffazione di alimenti e bevande e l'abuso di indicazioni geografiche costituiscono un'area criminale significativa e grave che deve essere affrontata a livello internazionale.
L’obiettivo dell’operazione OPSON è proteggere la salute e la sicurezza pubblica e, in definitiva, smantellare le reti criminali organizzate coinvolte. Europol e tutti i partner coinvolti combattono su tutti i fronti contro questa area criminale, che comprende attività nei mercati fisici e online – come le piattaforme di commercio elettronico – e l’intera filiera alimentare, dalle materie prime al prodotto finale.
Le tendenze della criminalità alimentare di quest’anno
Gli investigatori di tutta Europa hanno notato una continua tendenza dei truffatori a vendere alimenti scaduti. Infiltrandosi nelle aziende di smaltimento rifiuti, mettono le mani su masse di cibo scaduto che dovrebbero essere distrutte. Dopo aver semplicemente cancellato e ri-stampando le date di scadenza o stampando e attaccando nuove etichette, reimmettono nella filiera i prodotti scaduti. Per quanto riguarda gli alimenti contraffatti e erroneamente designati, l'olio d'oliva e i vini a denominazione di origine protetta (DOP) sono le tipologie di prodotti più colpiti.
Highlights da tutta Europa
La Guardia Civil spagnola, in collaborazione con i Carabinieri italiani e Europol, ha arrestato quattro persone e sequestrato circa 120.000 scatolette di tonno e 45.000 litri di olio. I proprietari arrestati di un'azienda conserviera a La Rioja (Logroño) preparavano i prodotti in scatola con tonno di qualità inferiore a quella indicata sull'etichetta, così come con olio di girasole o sansa etichettata come olio di oliva, riuscendo così a commercializzare i prodotti a prezzi molto inferiori rispetto ai concorrenti.
In tutta la Spagna, la Guardia Civil è intervenuta contro i contraffattori di prodotti come olio, prosciutto o formaggio. A Valencia, un'azienda produttrice di sottaceti è stata indagata per aver venduto prodotti non idonei al consumo a causa dell'aggiunta di coloranti e conservanti illegali. Sono state sequestrate 80 tonnellate di prodotto, gran parte del quale pronto per la vendita e il consumo.
L'Arma dei Carabinieri
I Nuclei Antisofisticazione e Sanità dell’Arma dei Carabinieri, NAS, in collaborazione con altre autorità, hanno identificato e sequestrato circa 42 tonnellate di olio adulterato. Il prodotto, commercializzato come olio extra vergine di oliva italiano, era pronto per la distribuzione, oppure -in alcuni casi – erano già entrati nel mercato. Gli agenti sequestrati hanno perquisito diversi luoghi quali magazzini e hanno sequestrato anche 71 tonnellate di sostanze oleose, contenute in vaschette e taniche di plastica di varie dimensioni nonché 623 litri di clorofilla utilizzata per la adulterazione degli oli. Il valore totale degli oggetti sequestrati, che comprende attrezzature per l'imballaggio, etichette, un veicolo da trasporto, carrelli elevatori ed elettronica per un importo di 900.000 euro.
Anche in Italia i Carabinieri hanno smantellato una rete criminale dedita alla contraffazione di vini a denominazione di origine protetta (DOP) o indicazione geografica protetta (IGP).
I criminali hanno falsificato i registri elettronici delle cantine di un organismo di certificazione della qualità del vino etichettando erroneamente i vini con un certificato DOC. A seguito dell'indagine sono stati sequestrati circa 60.000 litri di vino contraffatto.
Come riportato in precedenza da Europol, un'indagine condotta dalla gendarmeria francese (Gendarmerie Nationale), che coinvolge i Carabinieri italiani e la Polizia Federale Svizzera, con il supporto di Europol ed Eurojust, ha portato allo smantellamento di una rete criminale che contraffava i vini francesi a Denominazione di Origine Protetta (DOP) in Italia. La rete criminale falsificava il vino rosso francese, facendo pagare fino a 15.000 euro a bottiglia.
Il vino falso è stato contraffatto in Italia, poi consegnato a un aeroporto italiano ed esportato per la vendita a valore di mercato in tutto il mondo da onesti commercianti di vino. L'operazione ha portato a sei arresti e sequestri per un valore di 1,4 milioni di euro, oltre a oltre 100mila euro in contanti e documenti.
Risultati OPSON XIII:
11 reti criminali smantellate,
emessi 104 mandati di arresto,
184 mandati di perquisizione emessi,
278 persone denunciate all'autorità giudiziaria,
5 821 controlli e ispezioni effettuati.
In totale sono state ritirate dal mercato merci per un valore di oltre 91 milioni di euro.
#Europol #OLAF #DGSANTE #DGAGRI #Armadeicarabinieri #NAS #Gendarmerienationale #Guardiacivil
Notizie dall'Italia e dal mondo reshared this.
𝔻𝕚𝕖𝕘𝕠 🦝🧑🏻💻🍕
in reply to 𝔻𝕚𝕖𝕘𝕠 🦝🧑🏻💻🍕 • •update shortly. Thanks @Informa Pirata for reporting quickly!
like this
Poliverso - notizie dal Fediverso ⁂ e Informa Pirata like this.
RaccoonForFriendica reshared this.