Bastian’s Night #426 May, 22th
Every Thursday of the week, Bastian’s Night is broadcast from 21:30 CET (new time).
Bastian’s Night is a live talk show in German with lots of music, a weekly round-up of news from around the world, and a glimpse into the host’s crazy week in the pirate movement aka Cabinet of Curiosities.
If you want to read more about @BastianBB: –> This way
The Mouse Language, Running on Arduino
Although plenty of us have our preferred language for coding, whether it’s C for its hardware access, Python for its usability, or Fortran for its mathematic prowess, not every language is specifically built for problem solving of a particular nature. Some are built as thought experiments or challenges, like Whitespace or Chicken but aren’t used for serious programming. There are a few languages that fit in the gray area between these regions, and one example of this is the language MOUSE which can now be run on an Arduino.
Although MOUSE was originally meant to be a minimalist language for computers of the late 70s and early 80s with limited memory (even for the era), its syntax looks more like a more modern esoteric language, and indeed it arguably would take a Python developer a bit of time to get used to it in a similar way. It’s stack-based, for a start, and also uses Reverse Polish notation for performing operations. The major difference though is that programs process single letters at a time, with each letter corresponding to a specific instruction. There have been some changes in the computing world since the 80s, though, so [Ivan]’s version of MOUSE includes a few changes that make it slightly different than the original language, but in the end he fits an interpreter, a line editor, graphics primitives, and peripheral drivers into just 2KB of SRAM and 32KB Flash so it can run on an ATmega328P.
There are some other features here as well, including support for PS/2 devices, video output, and the ability to save programs to the internal EEPROM. It’s an impressive setup for a language that doesn’t get much attention at all, but certainly one that threads the needle between usefulness and interesting in its own right. Of course if a language where “Hello world” is human-readable is not esoteric enough, there are others that may offer more of a challenge.
190 milioni rubati in pochi click: così è stato arrestato l’uomo chiave del caso Nomad
Il cittadino americano-israeliano Alexander Gurevich è stato arrestato a Gerusalemme con l’accusa di essere coinvolto in uno dei più grandi attacchi informatici nella storia della finanza decentralizzata. L’attacco in questione riguarda il ponte cross-chain Nomad, che ha portato al furto di circa 190 milioni di dollari in criptovalute nell’agosto 2022.
Secondo la piattaforma analitica TRM Labs, sono stati i loro specialisti a fornire alle agenzie internazionali di contrasto le informazioni che hanno permesso loro di stabilire l’identità di Gurevich. Il suo arresto è stato il risultato del coordinamento tra la polizia israeliana, il Dipartimento di Giustizia degli Stati Uniti, l’FBI e l’Interpol. Gurevich sarà presto estradato negli Stati Uniti; sono già state concordate le necessarie procedure legali.
Nomad Bridge è un protocollo che consente agli utenti di trasferire asset tra diverse blockchain. Il 1° agosto 2022, gli aggressori hanno sfruttato una vulnerabilità nella funzione process() dello smart contract Replica, emersa dopo un aggiornamento. Invece di verificare completamente la prova del messaggio, il sistema accettava qualsiasi transazione con un hash di radice corretto, indipendentemente dalla sua validità. Ciò ha consentito all’aggressore di aggirare il controllo e di prelevare fondi dal bridge.
Lo schema in sé era così primitivo che è stato rapidamente copiato da centinaia di altri wallet: era sufficiente ripetere il formato di una transazione riuscita. L’attacco hacker “in stile mob” che ne risultò si trasformò in un attacco di massa spontaneo, con centinaia di partecipanti che saccheggiarono simultaneamente le risorse del bridge. In totale sono stati rubati più di 190 milioni di dollari in ETH, USDC, WBTC e altri token ERC-20.
Sebbene Gurevich, secondo TRM Labs, non abbia creato l’exploit né lanciato l’attacco, il suo ruolo nel crimine è considerato fondamentale. Ha collaborato con i primi partecipanti ed è stato coinvolto nel riciclaggio di ingenti quantità di beni rubati. I portafogli associati hanno iniziato a ricevere fondi nel giro di poche ore dall’attacco.
Gurevich ha utilizzato il “chain-hopping” per nascondere le sue tracce, trasferendo fondi tra diverse blockchain tramite il mixer Tornado Cash e trasferendo anche ethereum nelle criptovalute anonime Monero (XMR) e Dash. Per incassare la criptovaluta, ha utilizzato exchange non depositari, broker over-the-counter, conti offshore e società fittizie. Una parte dei fondi è stata trasferita in valuta fiat tramite piattaforme che non richiedono la verifica dell’identità.
Nonostante il sistema di occultamento a più stadi e il lungo lasso di tempo trascorso dall’attacco, gli specialisti sono riusciti a tracciare le transazioni e a stabilire un contatto con Gurevich, cosa che ha portato al suo arresto. Secondo i pubblici ministeri, l’uomo avrebbe personalmente prelevato da Nomad Bridge asset digitali per un valore di circa 2,89 milioni di dollari. Inoltre, il 4 agosto 2022, contattò il direttore tecnico di Nomad, ammise di essere alla ricerca di vulnerabilità, si scusò per l’accaduto e chiese addirittura una “ricompensa” di 500 mila dollari.
Inizialmente, nei rapporti di TRM Labs compariva un nome diverso: Ocie Morrell. Tuttavia, il 17 maggio 2025 è stato pubblicato un emendamento che confermava che la questione era in discussione. Al momento del suo arresto, stava tentando di lasciare Israele passando per l’aeroporto Ben Gurion, utilizzando documenti che riportavano il nome Alexander Blok, nome da lui ufficialmente cambiato poco prima dell’arresto.
Il caso Nomad Bridge è considerato uno degli esempi più chiari di come anche le vulnerabilità più semplici nell’infrastruttura DeFi possano portare a furti di massa e alla partecipazione di centinaia di wallet anonimi. Nonostante l’apparente anonimato delle transazioni blockchain, l’analisi delle tracce digitali e la cooperazione internazionale consentono di identificare gli organizzatori anche a distanza di anni.
L'articolo 190 milioni rubati in pochi click: così è stato arrestato l’uomo chiave del caso Nomad proviene da il blog della sicurezza informatica.
Plugging Plasma Leaks in Magnetic Confinement With New Guiding Center Model
Although the idea of containing a plasma within a magnetic field seems straightforward at first, plasmas are highly dynamic systems that will happily escape magnetic confinement if given half a chance. This poses a major problem in nuclear fusion reactors and similar, where escaping particles like alpha (helium) particles from the magnetic containment will erode the reactor wall, among other issues. For stellarators in particular the plasma dynamics are calculated as precisely as possible so that the magnetic field works with rather than against the plasma motion, with so far pretty good results.
Now researchers at the University of Texas reckon that they can improve on these plasma system calculations with a new, more precise and efficient method. Their suggested non-perturbative guiding center model is published in (paywalled) Physical Review Letters, with a preprint available on Arxiv.
The current perturbative guiding center model admittedly works well enough that even the article authors admit to e.g. Wendelstein 7-X being within a few % of being perfectly optimized. While we wouldn’t dare to take a poke at what exactly this ‘data-driven symmetry theory’ approach exactly does differently, it suggests the use machine-learning based on simulation data, which then presumably does a better job at describing the movement of alpha particles through the magnetic field than traditional simulations.
Top image: Interior of the Wendelstein 7-X stellarator during maintenance.
Working On Open-Source High-Speed Ethernet Switch
Our hacker [Andrew Zonenberg] reports in on his open-source high-speed Ethernet switch. He hasn’t finished yet, but progress has been made.
If you were wondering what might be involved in a high-speed Ethernet switch implementation look no further. He’s been working on this project, on and off, since 2012. His design now includes a dizzying array of parts. [Andrew] managed to snag some XCKU5P FPGAs for cheap, paying two cents in the dollar, and having access to this fairly high-powered hardware affected the project’s direction.
You might be familiar with [Andrew Zonenberg] as we have heard from him before. He’s the guy who gave us the glscopeclient, which is now ngscopeclient.
As perhaps you know, when he says in his report that he is an “experienced RTL engineer”, he is talking about Register-Transfer Level, which is an abstraction layer used by hardware description languages, such as Verilog and VHDL, which are used to program FPGAs. When he says “RTL” he’s not talking about Resistor-Transistor Logic (an ancient method of developing digital hardware) or the equally ancient line of Realtek Ethernet controllers such as the RTL8139.
When it comes to open-source software you can usually get a copy at no cost. With open-source hardware, on the other hand, you might find yourself needing to fork out for some very expensive bits of kit. High speed is still expensive! And… proprietary, for now. If you’re looking to implement Ethernet hardware today, you will have to stick with something slower. Otherwise, stay tuned, and watch this space.
Common Ramen reshared this.
La data certa è tornata!
@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/datacert…
Con il provvedimento odierno, il Garante Privacy ha pesantemente sanzionato Replika, l'azienda nota per aver applicato l'intelligenza artificiale generativa ai chatbot, mettendo a disposizione del mondo nuovi e fantastici amici virtuali, fidanzate immaginarie, confidenti particolari,
Privacy Pride reshared this.
Davide Giacalone relatore alla Scuola di Liberalismo – Gazzetta del Sud
@Politica interna, europea e internazionale
L'articolo Davide Giacalone relatore alla Scuola di Liberalismo – Gazzetta del Sud proviene da Fondazione Luigi Einaudi.
Politica interna, europea e internazionale reshared this.
Stylus Synth Should Have Used a 555– and Did!
For all that “should have used a 555” is a bit of a meme around here, there’s some truth to it. The humble 555 is a wonderful tool in the right hands. That’s why it’s wonderful to see this all-analog stylus synth project by EE student [DarcyJ] bringing the 555 out for the new generation.
The project is heavily inspired by the vintage stylophone, but has some neat tweaks. A capacitor bank means multiple octaves are available, and using a ladder of trim pots instead of fixed resistors makes every note tunable. [Darcy] of course included the vibrato function of the original, and yes, he used a 555 for that, too. He put a trim pot on that, too, to control the depth of vibrato, which we don’t recall seeing on the original stylophone.
The writeup is very high quality and could be recommended to anyone just getting started in analog (or analogue) electronics– not only does [Darcy] explain his design process, he also shows his pratfalls and mistakes, like in the various revisions he went through before discovering the push-pull amplifier that ultimately powers the speaker.
Since each circuit is separately laid out and indicated on the PCB [Darcy] designed in KiCad for this project. Between that and everything being thru-hole, it seems like [Darcy] has the makings of a lovely training kit. If you’re interested in rolling your own, the files are on GitHub under a CERN-OHL-S v2 license, and don’t forget to check out the demo video embedded below to hear it in action.
Of course, making music on the 555 is hardly a new hack. We’ve seen everything from accordions to paper-tape player pianos to squonkboxes over the years. Got another use for the 555? Let us know about it, in the inevitable shill for our tip line you all knew was coming.
youtube.com/embed/EBShBqbxInw?…
Il riarmo (in)sostenibile dell'Europa
Il riarmo (in)sostenibile dell'Europa
“Abbiamo bisogno di un’industria della difesa forte, dato che la nostra Unione si assume una maggiore responsabilità per la propria difesa: non è solo una questione di sicurezza, ma anche di competitività” ha dichiarato il 12 maggio il presidente del…www.altrenotizie.org
As The World Burns, At least You’ll Have Secure Messaging
There’s a section of our community who concern themselves with the technological aspects of preparing for an uncertain future, and for them a significant proportion of effort goes in to communication. This has always included amateur radio, but in more recent years it has been extended to LoRa. To that end, [Bertrand Selva] has created a LoRa communicator, one which uses a Pi Pico, and delivers secure messaging.
The hardware is a rather-nice looking 3D printed case with a color screen and a USB A port for a keyboard, but perhaps the way it works is more interesting. It takes a one-time pad approach to encryption, using a key the same length as the message. This means that an intercepted message is in effect undecryptable without the key, but we are curious about the keys themselves.
They’re a generated list of keys stored on an SD card with a copy present in each terminal on a particular net of devices, and each key is time-specific to a GPS derived time. Old keys are destroyed, but we’re interested in how the keys are generated as well as how such a system could be made to survive the loss of one of those SD cards. We’re guessing that just as when a Cold War spy had his one-time pad captured, that would mean game over for the security.
So if Meshtastic isn’t quite the thing for you then it’s possible that this could be an alternative. As an aside we’re interested to note that it’s using a 433 MHz LoRa module, revealing the different frequency preferences that exist between enthusiasts in different countries.
youtube.com/embed/R846vWyKoqg?…
Viral AI-Generated Summer Guide Printed by Chicago Sun-Times Was Made by Magazine Giant Hearst
The Chicago Sun-Times said "we understand this is unacceptable for us to distribute."Jason Koebler (404 Media)
Dalla newsletter di Haaretz:
Yair Golan, leader of the left-wing The Democrats party, told Israel's public broadcaster that "Israel is on the path to becoming a pariah state, like South Africa once was, if it does not return to acting like a sane country." Golan further said that "a sane state does not wage war against civilians, does not kill babies as a hobby, and does not set goals for itself like the expulsion of a population." The Democrats chair also criticized the government's conduct, saying it is "full of vengeful, unintelligent, and immoral individuals who lack the ability to run a country in a time of emergency – people who have nothing whatsoever to do with Judaism."
freezonemagazine.com/news/paol…
Tra le tante iniziative ed incontri che lo IED di Milano propone, vogliamo segnalarvi quello del prossimo 26 maggio. Le copertine dei dischi non sono solo grafiche: sono specchi dei tempi, manifesti di lotte, stereotipi, emancipazioni. Paolo Mazzucchelli ci guida in un viaggio visivo e sonoro tra icone, cliché e
#Gaza, il manuale del #genocidio
Gaza, il manuale del genocidio
Davanti agli occhi di tutto il mondo e con i propri obiettivi spiegati nel dettaglio e senza possibilità di equivoci, Israele ha iniziato nelle scorse ore quella che si annuncia come la fase finale della soluzione al “problema palestinese”.www.altrenotizie.org
Urteil zu Versammlungsfreiheit: Plastikfolie ist keine Schutzbewaffnung
The Make-roscope
Normal people binge-scroll social media. Hackaday writers tend to pore through online tech news and shopping sites incessantly. The problem with the shopping sites is that you wind up buying things, and then you have even more projects you don’t have time to do. That’s how I found the MAKE-roscope, an accessory aimed at kids that turns a cell phone into a microscope. While it was clearly trying to appeal to kids, I’ve had some kids’ microscopes that were actually useful, and for $20, I decided to see what it was about. If nothing else, the name made it appealing.
My goal was to see if it would be worth having for the kinds of things we do. Turns out, I should have read more closely. It isn’t really going to help you with your next PCB or to read that tiny print on an SMD part. But it is interesting, and — depending on your interests — you might enjoy having one. The material claims the scope can magnify from 125x to 400x.
What Is It?
A microscope in a tin. Just add a cell phone or tablet
The whole thing is in an unassuming Altoids-like tin. Inside the box are mostly accessories you may or may not need, like a lens cloth, a keychain, plastic pipettes, and the like. There are only three really interesting things: A strip of silicone with a glass ball in it, and a slide container with five glass slides, three of which have something already on them. There’s also a spare glass ball (the lens).
What I didn’t find in my box were cover slips, any way to prepare specimens, and — perhaps most importantly — clear instructions. There are some tiny instructions on the back of the tin and on the lens cloth paper. There is also a QR code, but to really get going, I had to watch a video (embedded below).
youtube.com/embed/Td62kPb24tU?…
What I quickly realized is that this isn’t a metalurgical scope that takes images of things. It is a transmissive microscope like you find in a biology lab. Normally, the light in a scope like that goes up through the slide and into the objective. This one is upside down. The light comes from the top, through the slide, and into the glass ball lens.
Bio Scopes Can Be Fun
Of course, if you have an interest in biology or thin films or other things that need that kind of microscope, this could be interesting. After all, cell phones sometimes have macro modes that you can use as a pretty good low-power microscope already if you want to image a part or a PCB. You can also find lots of lenses that attach to the phone if you need them. But this is a traditional microscope, which is a bit different.
The silicone compresses, which seems to be the real trick. Here’s how it works in practice. You turn on your camera and switch to the selfie lens. Then you put the silicone strip over the camera and move it around. You’ll see that the lens makes a “spotlight” in the image when it is in the right place. Get it centered and zoom until you can’t see the circle of the lens anymore.
Then you put your slide down on the lens and move it around until you get an image. It might be a little fuzzy. That’s where the silicone comes in. You push down, and the image will snap into focus. The hardest part is pushing down while holding it still and pushing the shutter button.
Zeiss and Nikon don’t have anything to worry about, but the images are just fine. You can grab a drop of water or swab your cheek. It would have been nice to have some stain and either some way to microtome samples, or at least instructions on how you might do that with household items.
Verdict
For most electronics tasks, you are better off with a loupe, magnifiers, a zoomed cell phone, or a USB microscope. But if you want a traditional microscope for science experiments or to foster a kid’s interest in science, it might be worth something.
For electronics, you are better off with a metallurgical scope. Soldering under a stereoscope is life-changing. We’ve seen more expensive versions of this, too, but we aren’t sure they are much better.
Ransomware ESXi, falso password manager KeePass sotto attacco: come proteggersi
@Informatica (Italy e non Italy 😁)
I cybercriminali hanno creato siti web cloni di KeePass ed alcuni siti falsi del password manager sono stati sponsorizzati tramite Google Ads, sfruttando tecniche di malvertising per distribuire il ransomware ESXi. Ecco come mitigare il rischio
Informatica (Italy e non Italy 😁) reshared this.
TikTok sotto la lente Ue: perché la piattaforma è accusata di violare il Dsa e cosa rischia davvero
@Informatica (Italy e non Italy 😁)
L’inadempimento da parte di TikTok del Regolamento Ue, se confermato, può costare fino al 6% del fatturato mondiale. La cinese ByteDance (società madre del social) rischia anche l’imposizione di una
Informatica (Italy e non Italy 😁) reshared this.
Buy Atlantic, Lockheed Martin si prepara a investire direttamente in Europa
@Notizie dall'Italia e dal mondo
L’Europa si trova oggi in una fase cruciale di ridefinizione delle sue politiche di difesa. Gli shock geopolitici degli ultimi anni — dall’aggressione russa all’Ucraina alle pressioni di Donald Trump per un maggiore impegno europeo nella Nato — hanno costretto Bruxelles
Notizie dall'Italia e dal mondo reshared this.
Thinkpad E570 - Intel Core i5-7200U 2.50Ghz - 8Gb - Questo è un post automatico da FediMercatino.it
Prezzo: 120 €
Lenovo Thinkpad E570
Intel Core i5-7200U 2.50Ghz , 2 Core - 4 Processori logici
Ram DDR4 8Gb
Disco SSD 256Gb
Intel Graphics 620
Schermo 15.4"
Risoluzione 1920x1080
Lettore di impronte digitali
1 porta HDMI
3 porte USB-A
1 porta USB-C
1 porta Ethernet
Batteria in buono stato - durata indicativa 2 ore (in base ad un medio utilizzo)
Cavo di ricarica e alimentatore
Preinstallato Windows 11 Pro Edition
Qualche lieve ammaccatura dovuta all'utilizzo.
Tastiera in alcuni punto usurata
Lievi danni estetici visibili da foto a corredo
Price: 120 € :: Questo è un articolo disponibile su FediMercatino.it
Si prega di rispondere con un messaggio diretto/privato al promotore dell'annuncio.
Per informazioni su: Fedimercatino: Chi siamo
reshared this
Referendum, PRC: I sindaci scrivano a cittadine/i
Apprezziamo che molti sindaci - in particolare quelli aderenti a Ali - abbiano sottoscritto un appello al voto referendario. Riteniamo però che i sindaci eRifondazione Comunista
When Repairs Go Inside Integrated Circuits
What can you do if your circuit repair diagnosis indicates an open circuit within an integrated circuit (IC)? Your IC got too hot and internal wiring has come loose. You could replace the IC, sure. But what if the IC contains encryption secrets? Then you would be forced to grind back the epoxy and fix those open circuits yourself. That is, if you’re skilled enough!
In this video our hacker [YCS] fixes a Mercedes-Benz encryption chip from an electronic car key. First, the black epoxy surface is polished off, all the way back to the PCB with a very fine gradient. As the gold threads begin to be visible we need to slow down and be very careful.
The repair job is to reconnect the PCB points with the silicon body inside the chip. The PCB joints aren’t as delicate and precious as the silicon body points, those are the riskiest part. If you make a mistake with those then repair will be impossible. Then you tin the pads using solder for the PCB points and pure tin and hot air for the silicon body points.
Once that’s done you can use fine silver wire to join the points. If testing indicates success then you can complete the job with glue to hold the new wiring in place. Everything is easy when you know how!
Does repair work get more dangerous and fiddly than this? Well, sometimes.
youtube.com/embed/9y7xRpFYLjk?…
Thanks to [J. Peterson] for this tip.
The World Wide Web and the Death of Graceful Degradation
In the early days of the World Wide Web – with the Year 2000 and the threat of a global collapse of society were still years away – the crafting of a website on the WWW was both special and increasingly more common. Courtesy of free hosting services popping up left and right in a landscape still mercifully devoid of today’s ‘social media’, the WWW’s democratizing influence allowed anyone to try their hands at web design. With varying results, as those of us who ventured into the Geocities wilds can attest to.
Back then we naturally had web standards, courtesy of the W3C, though Microsoft, Netscape, etc. tried to upstage each other with varying implementation levels (e.g. no iframes in Netscape 4.7) and various proprietary HTML and CSS tags. Most people were on dial-up or equivalently anemic internet connections, so designing a website could be a painful lesson in optimization and targeting the lowest common denominator.
This was also the era of graceful degradation, where us web designers had it hammered into our skulls that using and navigating a website should be possible even in a text-only browser like Lynx, w3m or antique browsers like IE 3.x. Fast-forward a few decades and today the inverse is true, where it is your responsibility as a website visitor to have the latest browser and fastest internet connection, or you may even be denied access.
What exactly happened to flip everything upside-down, and is this truly the WWW that we want?
User Vs Shinies
Back in the late 90s, early 2000s, a miserable WWW experience for the average user involved graphics-heavy websites that took literal minutes to load on a 56k dial-up connection. Add to this the occasional website owner who figured that using Flash or Java applets for part of, or an entire website was a brilliant idea, and had you sit through ten minutes (or more) of a loading sequence before being able to view anything.
Another contentious issue was that of the back- and forward buttons in the browser as the standard way to navigate. Using Flash or Java broke this, as did HTML framesets (and iframes), which not only made navigating websites a pain, but also made sharing links to a specific resource on a website impossible without serious hacks like offering special deep links and reloading that page within the frameset.
As much as web designers and developers felt the lure of New Shiny Tech to make a website pop, ultimately accessibility had to be key. Accessibility, through graceful degradation, meant that you could design a very shiny website using the latest CSS layout tricks (ditching table-based layouts for better or worse), but if a stylesheet or some Java- or VBScript stuff didn’t load, the user would still be able to read and navigate, at most in a HTML 1.x-like fashion. When you consider that HTML is literally just a document markup language, this makes a lot of sense.Credit: Babbage, Wikimedia.
More succinctly put, you distinguish between the core functionality (text, images, navigation) and the cosmetics. When you think of a website from the perspective of a text-only browser or assistive technology like screen readers, the difference should be quite obvious. The HTML tags mark up the content of the document, letting the document viewer know whether something is a heading, a paragraph, and where an image or other content should be referenced (or embedded).
If the viewer does not support stylesheets, or only an older version (e.g. CSS 2.1 and not 3.x), this should not affect being able to read text, view images and do things like listen to embedded audio clips on the page. Of course, this basic concept is what is effectively broken now.
It’s An App Now
Somewhere along the way, the idea of a website being an (interactive) document seems to have been dropped in favor of a the website instead being a ‘web application’, or web app for short. This is reflected in the countless JavaScript, ColdFusion, PHP, Ruby, Java and other frameworks for server and client side functionality. Rather than a document, a ‘web page’ is now the UI of the application, not unlike a graphical terminal. Even the WordPress editor in which this article was written is in effect just a web app that is in constant communication with the remote WordPress server.
This in itself is not a problem, as being able to do partial page refreshes rather than full on page reloads can save a lot of bandwidth and copious amounts of sanity with preserving page position and lack of flickering. What is however a problem is how there’s no real graceful degradation amidst all of this any more, mostly due to hard requirements for often bleeding edge features by these frameworks, especially in terms of JavaScript and CSS.
Sometimes these requirements are apparently merely a way to not do any testing on older or alternative browsers, with ‘forum’ software Discourse (not to be confused with Disqus) being a shining example here. It insists that you must have the ‘latest, stable release’ of either Microsoft Edge, Google Chrome, Mozilla Firefox or Apple Safari. Purportedly this is so that the client-side JavaScript (Ember.js) framework is happy, but as e.g. Pale Moon users have found out, the problem is with a piece of JS that merely detects the browser, not the features. Blocking the browser-detect-*
script in e.g. an adblocker restores full functionality to Discourse-afflicted pages.
Wrong Focus
It’s quite the understatement to say that over the past decades, websites have changed. For us greybeards who were around to admire the nascent WWW, things seemed to move at a more gradual pace back then. Multimedia wasn’t everywhere yet, and there was no Google et al. pushing its own agenda along with Digital Restrictions Management (DRM) onto us internet users via the W3C, which resulted in the EFF resigning in protest.Google Search open in the Pale Moon browser.
Although Google et al. ostensibly profess to have only our best interests at heart when features were added to Chrome, the very capable plugins system from Netscape and Internet Explorer taken out back and WebExtensions Manifest V3 introduced (with the EFF absolutely venomous about the latter), privacy concerns are mounting amidst concerns that corporations now control the WWW, with even new HTML, CSS and JS features being pushed by Google solely for its use in Chrome.
For those of us who still use traditional browsers like Pale Moon (forked from Firefox in 2009), it is especially the dizzying pace of new ‘features’ that discourages us from using effectively non-Chromium-based browsers, with websites all too often having only been tested in Chrome. Functionality in Safari, Pale Moon, etc. often is more a matter of luck as the assumption is made by today’s crop of web devs that everyone uses the latest and greatest Chrome browser version. This ensures that using non-Chromium browsers is fraught with functionally defective websites, as the ‘Web Compatibility Support’ section of the Pale Moon forum illustrates.
Question is whether this is the web which we, the users, want to see.
Low-Fidelity Feature
Another unpleasant side-effect of web apps is that they force an increasing amount of JS code to be downloaded, compiled and ran. This contrasts with plain HTML and CSS pages that tend to be mere kilobytes in size in addition to any images. Back in The Olden Days browsers gave you the option to disable JavaScript, as the assumption was that JS wasn’t used for anything critical. These days if you try to browse with e.g. a JS blocking extension like NoScript, you’ll rapidly find that there’s zero consideration for this, and many sites will display just a white page because they rely on a JS-based stub to do the actual rendering of the page rather than the browser.
In this and earlier described scenarios the consequence is the same: you must be using the latest Chromium-based browser to use many sites, you will be using a lot of RAM and CPU for even basic pages, and forget about using retro- or alternative systems that do not support the latest encryption standards and certificates.
The latter is due to the removal of non-encrypted HTTP from many browsers, because for some reason downloading public information from HTTP and FTP sites without encrypting said public data is a massive security threat now, and the former is due to the frankly absurd amounts of JS, with the Task Manager feature in many browsers showing the resource usage per tab, e.g.:The Task Manager in Microsoft Edge showing a few active tabs and their resource usage.
Of these tabs, there is no way to reduce their resource usage, no ‘graceful degradation’ or low-fidelity mode, so that older systems as well as the average smart phone or tablet will struggle or simply keel over to keep up with the demands of the modern WWW, with even a basic page using more RAM than the average PC had installed by the late 90s.
Meanwhile the problems that we web devs were moaning about around 2000 such as an easy way to center content with CSS got ignored, while some enterprising developers have done the hard work of solving the graceful degradation problem themselves. A good example of this is the FrogFind! search engine, which strips down DuckDuckGo search results even further, before passing any URLs you click through a PHP port of Mozilla’s Readability. This strips out anything but the main content, allowing modern website content to be viewed on systems with browsers that were current in the very early 1990s.
In short, graceful degradation is mostly an issue of wanting to, rather than it being some kind of unsurmountable obstacle. It requires learning the same lessons as the folk back in the Flash and Java applet days had to: namely that your visitors don’t care how shiny your website, or how much you love the convoluted architecture and technologies behind it. At the end of the day your visitors Just Want Things to Work, even if that means missing out on the latest variation of a Flash-based spinning widget or something similarly useless that isn’t content.
Tl;dr: content is for your visitors, the eyecandy is for you and your shareholders.
Proteste in Marocco per la presenza della Brigata israeliana Golani alle manovre “African Lion 2025”
@Notizie dall'Italia e dal mondo
Questa unità è considerata responsabile della strage di 15 paramedici palestinesi della Mezzaluna Rossa e dell'Onu avvenuta nella scorse settimane a Rafah, sul confine tra Gaza e l'Egitto
L'articolo Proteste
Notizie dall'Italia e dal mondo reshared this.
Garante Privacy: ecco cosa contesta al chatbot Replika
@Informatica (Italy e non Italy 😁)
Il Garante Privacy sanziona la società di San Francisco Luka per il chatbot Replika. Ed apre un autonomo procedimento con specifico riferimento alle basi giuridiche relative all’intero ciclo di vita del sistema di intelligenza artificiale
L'articolo Garante Privacy: ecco cosa contesta al chatbot
Informatica (Italy e non Italy 😁) reshared this.
Dominio subacqueo tra industria e difesa. Fincantieri verso il primato sull’underwater
@Notizie dall'Italia e dal mondo
Annunciando la firma del Memorandum of Understanding (MoU) con Graal Tech S.r.l, per lo sviluppo di droni subacquei autonomi e per l’addestramento del personale addetto, Fincantieri pone importanti tasselli strategici per la leadership nel controllo e nella difesa delle soluzioni
Notizie dall'Italia e dal mondo reshared this.
Il regista del film di Julian Assange "L'uomo da sei miliardi di dollari" vince il Golden Globe per il miglior documentario
Eugene Jarecki , regista del film di Julian Assange "L'uomo da sei miliardi di dollari", ha ricevuto il primo Golden Globe per il miglior documentario. Il suo film è presentato in anteprima mondiale al Festival di Cannes .
Il premio, conferito dalla Artemis Rising Foundation, è stato consegnato a Jarecki lunedì al Festival di Cannes.
Jarecki ha vinto due volte il Sundance Grand Jury Prize e numerosi Emmy e Peabody Award.
variety.com/2025/film/global/e…
@Cinema, Televisione e Serie TV
Eugene Jarecki Wins Golden Globe Prize for Documentary
Eugene Jarecki, director of Julian Assange film “The Six Billion Dollar Man,” has been awarded the first-ever Golden Globe Prize for Documentary.Leo Barraclough (Variety)
like this
reshared this