Salta al contenuto principale



Microsoft’s New Agentic Web Protocol Stumbles With Path Traversal Exploit


If the term ‘NLWeb’ first brought to mind an image of a Dutch internet service provider, you’re probably not alone. What it actually is – or tries to become – is Microsoft’s vision of a parallel internet protocol using which website owners and application developers can integrate whatever LLM-based chatbot they desire. Unfortunately for Microsoft, the NLWeb protocol just suffered its first major security flaw.

The flaw is an absolute doozy, involving a basic path traversal vulnerability that allows an attacker to use appropriately formatted URLs to traverse the filesystem of the remote, LLM-hosting, system to extract keys and other sensitive information. Although Microsoft patched it already, no CVE was assigned, while raising the question of just how many more elementary bugs like this may be lurking in the protocol and associated software.

As for why a website or application owner might be interested in NLWeb, the marketing pitch appears to be as an alternative to integrating a local search function. This way any website or app can have their own ChatGPT-style search functionality that is theoretically restricted to just their website, instead of chatbot-loving customers going to the ChatGPT or equivalent site to ask their questions there.

Even aside from the the strong ‘solution in search of a problem’ vibe, it’s worrying that right from the outset it seems to introduce pretty serious security issues that suggest a lack of real testing, never mind a strong ignorance of the fact that a lack of user input sanitization is the primary cause for widely exploited CVEs. Unknown is whether GitHub Copilot was used to write the affected codebase.


hackaday.com/2025/08/07/micros…



The leading voice for visual journalists may be silenced. You can help.


For decades, one organization has dedicated itself to protecting the rights of news photographers and videographers. The National Press Photographers Association has led countless First Amendment battles to protect visual journalists’ right to document and the public’s right to see and hear the news.

The organization’s general counsel, Mickey Osterreicher, is often at the forefront of those fights. He and NPPA have protected the First Amendment right to record in public, limited senseless government regulations restricting photography and recording, and even won a groundbreaking settlement with the New York Police Department over its treatment of journalists at protests.

But recently, NPPA announced that it faces financial difficulties. Freedom of the Press Foundation (FPF) spoke to Osterreicher about NPPA’s work and the impact on the First Amendment if it shutters. You can read our full conversation below, and you can donate to NPPA’s programs here.

You’ve been NPPA’s general counsel since 2005, and you’ve also been a news photographer. How have the legal issues facing visual journalists changed over the years, and what are the most pressing issues they face today?

Both from a practical and legal standpoint, being a journalist was a lot simpler when I was a photojournalist. One of the biggest challenges I now face is trying to answer the question from police and lawmakers, “Who is a journalist?” and, during a protest, “Who gets to stay after an order to disperse?”

But once those press access rights have been attained, what good is it if visual journalists cannot make a decent living after risking their health and safety because their images are being misappropriated without permission, credit, or compensation? So it is a combination of dealing with First Amendment and copyright issues that keeps me up most nights.

That is to say nothing of the exponential use of generative artificial intelligence that has economically impacted the market for news photography as well as creating ethical challenges for visual journalists and public perception.

Tell us more about how the rise of AI-generated images and deepfakes is affecting the work and rights of visual journalists.

For visual journalism, generative artificial intelligence is the worst of both worlds, where millions of images (still and video) are ingested to train AI models without payment to the creators and the public can no longer believe what they see without wondering if what they are viewing is a true depiction of what really happened or an artificially created image. Even worse, this technology now provides an additional layer of ambiguity to those who claim that actual images of real events are “fake news.”

You’ve trained many law enforcement officers about journalists’ First Amendment rights, especially when they’re covering political conventions and protests. What are the most important things for police officers to know about press freedom, and how is NPPA uniquely positioned to provide that training?

I have three goals when training police and journalists about press freedoms. One: that police are not sued for abridging First Amendment rights of citizens and journalists, costing taxpayers dearly with money that could be better spent for police recruitment and retention or equipment. Two: that journalists are able to do their jobs without being harassed, injured, or arrested. Three: that the public is informed, which is the basis for the First Amendment — that being the desire by the founding fathers for the right of the public to receive information, and be an informed electorate.

As “the voice of visual journalists” since 1946, NPPA is uniquely positioned to foster improved police-press-public relations in an era when it is most needed by instilling greater respect for the roles each plays in our democracy. We’ve provided these trainings to law enforcement agencies nationwide for almost 20 years, with scores of departments and hundreds of officers being trained, including the entire Minnesota State Patrol as part of the settlement terms of a federal civil rights lawsuit, as well as the start of training with the NYPD regarding the new policies and procedures implemented as a result of the settlement of our lawsuit.

“Should our voice be muted, its silence will be deafening.“


Mickey Osterreicher

What I believe also adds to NPPA’s credibility is my background as a photojournalist with over forty years’ experience in print and broadcast, my experience as a First Amendment attorney, and my understanding of the challenges facing law enforcement from having been a uniformed reserve deputy sheriff with the Erie County Sheriff’s Office since 1976 and working closely with law enforcement through various associations and committees.

That experience working with police departments — which not many press freedom organizations have — has also allowed you to get involved in many other issues that are important to all journalists, not just visual ones. Tell us about your work on police radio encryption and other ways you’re able to leverage the work you’ve done training police departments.

The encryption of police radio transmissions is a growing problem nationwide, because for almost a century, newsrooms and journalists have relied on the monitoring of those broadcasts to cover breaking news and other matters of public concern.

One place where such coverage is critical is New York City, where so many newsworthy events occur and where, because of the congested vehicle traffic, time is of the essence in getting to the scene. A few years ago, the NYPD announced that it would begin encrypting its transmissions. NPPA joined a consortium of news organizations asking to work with NYPD to allow journalists to continue to have real-time access to those broadcasts. Despite meeting with police officials, testifying before the city council and submitting a white paper on the subject, the NYPD has refused to discuss this issue further, and many of the important police frequencies have already been encrypted.

The consortium then supported a state bill that would allow for press access. That bill passed both houses and is awaiting the governor’s signature. NPPA has also worked with press groups around the country to address this issue.

Another problem we helped to solve was an exemption for journalists to a New York law that banned anyone in the state (except for certain “eligible professions”) from the “purchase, taking possession of, sale, exchange, giving or disposing of body armor.”

Additionally, NPPA was instrumental in opposing an Arizona bill that barred anyone recording police from getting closer than 15 feet to an officer without their permission. I drafted several letters to the legislature joined by 30 press organizations cautioning against the unconstitutionality of the proposed law, which was ultimately passed after the measure was amended to an 8-foot distance. I then worked with the American Civil Liberties Union and Arizona Broadcasters Association to obtain a permanent injunction prohibiting enforcement of the law. NPPA has also filed amicus briefs in two other constitutional challenges to similar laws in Indiana and Louisiana.

When the White House restricted the Associated Press’s access over its use of the term ‘Gulf of Mexico’ (a move that NPPA and FPF condemned), it raised concerns about the chilling effects of such retaliation on journalists. If presidents can exclude outlets or photographers from the press pool for editorial decisions, what does that mean for press freedom and the role of visual journalists?

As NPPA stated, such actions by the administration are unacceptable as both an attempt at prior restraint and a blatant retaliation and chilling abridgment of the First Amendment rights of the AP and its journalists.

Unfortunately, we have seen both the federal district court as well as the circuit court hearing the appeal in this case give wide latitude and discretion to the White House as to who it admits to cover certain events. Additional fallout from this has been the White House Correspondents Association losing its long-standing control over the press pool rotation as well as other “disfavored” media outlets being barred from inclusion in the pool.

All these actions taken by the administration are having a chilling effect on press coverage of the government and are eviscerating press freedom. The NPPA continues to work with news and press freedom organizations to advocate and support the right of the public to be informed.

Over the years, NPPA has had to oppose a number of laws that prohibit or limit taking pictures in public places as well as using drones to capture aerial footage. What should journalists do if they’re stopped and told they can’t take pictures or record in public?

Our staunch advocacy has led to the right to photograph and record in traditional public forums being “clearly established” in three-quarters of the U.S. Circuit Courts of Appeal, which is key to successfully bringing civil rights claims against those who try to limit or interfere with those rights.

While NPPA was initially successful in challenging Texas drone regulations, that decision was reversed on appeal. But we have been effective in ensuring that language protecting the First Amendment rights of journalists to use drones for newsgathering be included in government regulations.

NPPA has provided extensive training as to what journalists can do if they’re stopped and told they can’t take pictures or record in public. The foremost advice is to meet with law enforcement on a regular basis to ensure that these rights are honored by police and to discuss how best to improve police-press interactions. While in the field, it is crucial to maintain situational awareness and pay attention to police and crowd movements to avoid being encircled (kettled). Always have an exit strategy, as it is always better to move to a different location than be arrested. If police stop or question you about your activities, make sure to identify yourself as a journalist.

What will journalism lose if NPPA is forced to close its doors?

It would be a significant loss to not only visual journalists but to journalism itself if NPPA were to cease as an organization. For almost 80 years, NPPA has strongly advocated for the rights of visual journalists and now more than ever that unique voice is needed as more journalists are required to report not only with words but images. It also comes at a time when the importance of truthful images could not be greater.

While there are many other organizations supporting the First Amendment and press freedoms, none is more exclusively dedicated to the advancement and protection of visual journalism in its role as a vital public service than the NPPA. Our code of ethics is often cited as exemplary of what visual journalism should strive to achieve. Should our voice be muted, its silence will be deafening.

Donate to NPPA’s programs here to help protect the rights of visual journalists and the public’s right to know.


freedom.press/issues/the-leadi…



Teardown of a Persil Smartwash Smart Laundry Detergent Ball



How to make doing laundry more smart, depending on your perspective. (Credit: Zerobrain, YouTube)How to make doing laundry more smart, depending on your perspective. (Credit: Zerobrain, YouTube)
Ever since the invention of washing machines, the process of doing laundry has become rather straightforward. Simply toss the dirty laundry into the machine, fill up the detergent, and let the preset program handle the rest. This of course has not prevented companies from coming up with ways to add more complexity to doing laundry, with Henkel’s Smartwash technology the latest example, as demonstrated by German YouTube channel [ZeroBrain] with a complete teardown.

Henkel is the owner of detergent brands like Persil and Somat, with the Smartwash ball supposedly offering ‘smart’ dosing of detergent for washing machines, with naturally a smartphone app with intrusive localization to personalize the laundry experience. Sadly the video is only in German, but the language of teardowns is universal.

Before the teardown, the device got tested as intended, with the video showing how to put the detergent with its special pod inside the device. The device then got connected to WiFi, followed by it performing the typical IoT firmware update. After half an hour [Zerobrain] was finally ready to do the laundry. During the washing cycle the 441 gram heavy ball audibly bounced inside the machine, though the rubber outside covering should prevent damage.

The IP68-rated internals are clearly not designed to be easily opened, requiring a certain level of violence to correct for this oversight. Eventually the internals are revealed, showing the inductive charging coil, controls pad and main PCB, along with a pump for the double-chambered detergent pod and a bunch of sensors dangling at the end of flexible PCBs.
The Persil Smartwash fully disassembled. (Credit: Zerobrain, YouTube)The Persil Smartwash fully disassembled. (Credit: Zerobrain, YouTube)
Interestingly, the heart of the main PCB is an ESP32-D0WD-V3, flanked by an ESP-PSRAMH 64 Mbit pseudo-static RAM. For charging the Li-ion cell a TP4056 is used, while a T3168 handles the wireless (Qi) power side of things. As for sensors, there are two Hall effect sensors that seem to be used to measure how much detergent and softener are being excreted by the pump.

What is fascinating is that it uses a single pump to pump both types of fluids independently from each other. There also appears to be a presence sensor to detect the presence of a pod, and some of the other ICs on the PCB may be an IMU to detect motion of the ball, but as hinted at in the accompanying app, you are still supposed to know the hardness of the local water supply and punch in the same details like laundry dirtiness that you’d normally read off the label on the detergent and softener packaging.

Thanks to [Jan Prägert] for the tip.

youtube.com/embed/Ko_5sd8PSFM?…


hackaday.com/2025/08/07/teardo…



Federico Orlando: il liberale che difese la libertà contro ogni censura


@Giornalismo e disordine informativo
articolo21.org/2025/08/federic…
Undici anni fa, l’8 agosto 2014, ci ha lasciato Federico Orlando, fondatore e primo presidente di Articolo 21. “Federico, che sensazioni provi a marciare tra tutte queste bandiere rosse?”Gli chiedemmo in occasione della prima




Oltre 70.000 documenti di identità violati da attacchi a 3 hotel italiani


@Informatica (Italy e non Italy 😁)
TL;DR oltre 70.000 documenti di identità provenienti da violazioni a tre strutture ricettive italiane sono stati messi in vendita sul web: un numero preoccupante che, soprattutto in periodo di vacanza, deve farci riflettere su trattamenti forse troppo

RFanciola reshared this.

in reply to Cybersecurity & cyberwarfare

la cosa particolarmente incredibile è che gli hotel non avrebbero mai dovuto avere quei dati!
in reply to Lorenzo Millucci

per fare un esempio negativo: recentemente la società che si occupa della raccolta rifiuti ci ha convocato per consegnarci i nuovi contenitori porta-a-porta. Nel processo di consegna hanno chiesto un documento d'identità, che hanno fotografato con un telefonino o tablet, e ora chissà dove tengono le immagini... 👿
in reply to 6AL

@6al forse è il caso che te ne accerti (o almeno che provi ad accertartene). Potresti ricevere delle "interessanti" sorprese

@cybersecurity @informatica @lmillucci

in reply to 6AL

@6al per caso hai notato se poi appoggiavano il documento al telefono? Perché con la carta di identità elettronica è possibile che leggano otticamente la chiave per decifrare i dati contenuti nel chip.
@6AL


A Repeater for WWVB


For those living in the continental US who, for whatever reason, don’t have access to an NTP server or a GPS device, the next best way to make sure the correct time is known is with the WWVB radio signal. Transmitting out of Colorado, the 60-bit 1 Hz signal reaches all 48 states in the low-frequency band and is a great way to get a clock within a few hundred nanoseconds of the official time. But in high noise situations, particularly on the coasts or in populated areas these radio-based clocks might miss some of the updates. To keep that from happening [Mike] built a repeater for this radio signal.

The repeater works by offloading most of the radio components to an Arduino. The microcontroller listens to the WWVB signal and re-transmits it at a lower power to the immediate area, in this case no further than a few inches away or enough to synchronize a few wristwatches. But it has a much better antenna for listening to WWVB so this eliminates the (admittedly uncommon) problem of [Mike]’s watches not synchronizing at least once per day. WWVB broadcasts a PWM signal which is easy for an Arduino to duplicate, but this one needed help from a DRV8833 amplifier to generate a meaningfully strong radio signal.

Although there have been other similar projects oriented around the WWVB signal, [Mike]’s goal for this was to improve the range of these projects so it could sync more than a single timekeeping device at a time as well as using parts which are more readily available and which have a higher ease of use. We’d say he’s done a pretty good job here, and his build instructions cover almost everything even the most beginner breadboarders would need to know to duplicate it on their own.


hackaday.com/2025/08/07/a-repe…



Video obtained and verified by 404 Media shows a CBP official wearing Meta's AI glasses, which are capable of recording and connecting with AI. “I think it should be seen in the context of an agency that is really encouraging its agents to actively intimidate and terrorize people," one expert said.#CBP #Immigration #Meta


A CBP Agent Wore Meta Smart Glasses to an Immigration Raid in Los Angeles


A Customs and Border Protection (CBP) agent wore Meta’s AI smart glasses to a June 30 immigration raid outside a Home Depot in Cypress Park, Los Angeles, according to photos and videos of the agent verified by 404 Media.

Meta does not have a contract with CBP, and 404 Media was unable to confirm whether or not the agent recorded any video using the smart glasses at the raid. Based on what we know so far, this appears to be a one-off case of an agent either wearing his personal device to an immigration raid, or CBP trying technology on an ad-hoc basis without a formal procurement process. Civil liberties and privacy experts told 404 Media, however, that even on a one-off basis, it signals that law enforcement agents are interested in smart glasses technology and that the wearing of smart glasses in an immigration raid context is highly concerning.

“There’s a nonzero chance the agent bought the Meta smart glasses because they wanted it for themselves and it’s the glasses they like to wear. But even if that’s the case, it’s worth pointing out that there are regulatory things that need to be thought through, and this stuff can trickle down to officers on an individual basis,” Jake Laperruque, deputy director of the Center for Democracy and Technology’s security and surveillance project, told 404 Media. “There needs to be compliance with rules and laws even if a technology is not handed out through the department. The questions around [smart glasses are ones] we’re going to have to grapple with very soon and they’re pretty alarming.”

The glasses were worn by a CBP agent outside of a Home Depot in Cypress Park, Los Angeles during a June 30 immigration raid which happened amid weeks of protests, the deployment of the National Guard and the Marines, and during which immigration enforcement in Los Angeles has become a flashpoint in the Trump administration’s mass deportation campaign and the backlash to it. 404 Media obtained multiple photos and videos of the CBP agent wearing the Meta glasses and verified that the footage and videos were taken outside of the Cypress Park Home Depot during an immigration raid. The agent in the photo is wearing Meta’s Ray Ban AI glasses, a mask, and a CBP uniform and patch. CBP did not respond to multiple requests for comment.


0:00
/0:15

In the video, a CBP agent motions to the person filming the video to back up. The Meta Ray Ban AI glasses are clearly visible on the agent’s face.

Meta’s AI smart glasses currently feature a camera, live-streaming capabilities, integration with Meta’s AI assistant, three microphones, and image and scene recognition capabilities through Meta AI. The Information reported that Meta is considering adding facial recognition capabilities to the device, though they do not currently have that functionality. When filming, a recording light on Meta’s smart glasses turns on; in the photos and brief video 404 Media has seen, the light is not on.

Students at Harvard University showed that they can be used in conjunction with off-the-shelf facial recognition tools to identify people in near real time.

💡
Do you know anything else about this? I would love to hear from you. Using a non-work device, you can message me securely on Signal at jason.404. Otherwise, send me an email at jason@404media.co.

Multiple experts 404 Media spoke to said that these smart glasses qualify as a body worn camera under the Department of Homeland Security’s and Customs and Border Protection’s video recording policies. CBP’s policy states that “no personally owned devices may be used in lieu of IDVRS [Incident Driven Video Recording Systems] to record law enforcement encounters,” and that “recorded data shall not be downloaded or recorded for personal use or posted onto a personally owned device.” DHS’s policy states “the use of personally owned [Body Worn Cameras] or other video, audio, or digital recording devices to record official law enforcement activities is prohibited.”

Under the Trump administration, however, enforcement of regulations for law enforcement engaging in immigration raids is largely out the window.

“I think it should be seen in the context of an agency that is really encouraging its agents to actively intimidate and terrorize people. Use of cameras can be seen as part of that,” Jay Stanley, a senior policy analyst at the ACLU, told 404 Media. “It’s in line with the masking that we’ve seen, and generally behavior that’s intended to terrorize people, masking failure to identify themselves, failure to wear clear uniforms, smashing windows, etc. A big part of why this is problematic is the utter lack of policy oversight here. If an agent videotapes themselves engaging in abusive activity, are they going to be able to bury that video? Are they going to be able to turn it on and off on the fly or edit it later? There are all kinds of abuses that can happen with these without regulation and enforcement of those regulations, and the prospects of that happening in this administration seem dim.”
playlist.megaphone.fm?p=TBIEA2…
When reached for comment, a Meta spokesperson asked 404 Media a series of questions about the framing of the article, and stressed that Meta does not have any contract with CBP. They then asked why Meta would be mentioned in the article at all: “I’m curious if you can explain why it is Meta will be mentioned by name in this piece when in previous 404 reporting regarding ICE facial recognition app and follow up reporting the term ‘smartphones’ or ‘phone’ is used despite ICE agents clearly using Apple iPhones and Android devices,” they said. Meta ultimately declined to comment for this story.

Meta also recently signed a partnership deal with defense contractor Anduril to offer AI, augmented reality, and virtual reality capabilities to the military through Meta’s Reality Labs division, which also makes the Meta smart glasses (though it is unclear what form this technology will take or what its capabilities will be). Earlier this year, Meta relaxed its content moderation policies on hate speech regarding the dehumanization of immigrants, and last month Meta’s CTO Andrew Bosworth was named an Army Reserve Lt. Colonel by the Trump administration.

“Meta has spent the last decade building AI and AR to enable the computing platform of the future,” Meta CEO Mark Zuckerberg said in a press release announcing the deal with Anduril. “We’re proud to partner with Anduril to help bring these technologies to the American servicemembers that protect our interests at home and abroad.”

“My mission has long been to turn warfighters into technomancers, and the products we are building with Meta do just that,” Anduril founder Palmer Luckey said in the press release.

In a recent earnings call, Zuckerberg said he believes smart glasses will become the primary way people interact with AI. “I think in the future, if you don’t have glasses that have AI or some way to interact with AI, I think you’re kind of similarly, probably [will] be at a pretty significant cognitive disadvantage compared to other people and who you’re working with, or competing against,” he said during the call. “That’s also going to unlock a lot of value where you can just interact with an AI system throughout the day in this multimodal way. It can see the content around you, it can generate a UI for you, show you information and be helpful.”

Immigrations and Customs Enforcement has recently gained access to a new facial recognition smartphone app called Mobile Fortify that is connected to several massive government databases, showing that DHS is interested in facial recognition tech.

Privacy and civil liberties experts told 404 Media that this broader context—with Meta heavily marketing its smart glasses while simultaneously getting into military contracting, and the Department of Homeland Security increasingly interested in facial recognition—means that seeing a CBP agent wearing Meta AI glasses in the field is alarming.

“Regardless of whether this was a personal choice by this agent or whether somehow CBP facilitated the use of these meta glasses, the fact that it was worn by this agent is disturbing,” Jeramie Scott, senior counsel and director of the Electronic Information Privacy Center told 404 Media. “Having this type of technology on a law enforcement agent starts heading toward the tactics of authoritarian governments who love to use facial recognition to try to suppress opposition.”

The fact is that Meta is at the forefront of popularizing smart glasses, which are not yet a widely adopted technology. The privacy practices and functionality of the glasses is, at the moment, largely being guided by Meta, whereas smartphones are a largely commodified technology at this point. And it’s clear that this consumer technology that the company markets on billboards as a cool way to record videos for Instagram is seen by some in law enforcement as enticing.

“It’s clear that whatever imaginary boundary there was between consumer surveillance tech and government surveillance tech is now completely erased,” Chris Gilliard, co-director of The Critical Internet Studies Institute and author of the forthcoming book Luxury Surveillance, told 404 Media.

“The fact is when you bring powerful new surveillance capabilities into the marketplace, they can be used for a range of purposes including abusive ones. And that needs to be thought through before you bring things like that into the marketplace,” the ACLU’s Stanley said.

Laperruque, of the CDT, said perhaps we should think about Meta smart glasses in the same way we think about other body cameras: “On the one hand, there’s a big difference between glasses with a computer built into them and a pair of Oakleys,” he said. “They’re not the only ones who make cameras you attach to your body. On the other hand, if that’s going to be the comparison, then let’s talk about this in the context of companies like Axon and other body-worn cameras.”

Update: After this article was published, the independent journalist Mel Buer (who runs the site Words About Work) reposted images she took at a July 7 immigration enforcement raid at MacArthur Park in Los Angeles. In Buer's footage and photos, two additional CBP agents can be seen wearing Meta smart glasses in the back of a truck; a third is holding a camera pointed out of the back of the truck. Buer gave 404 Media permission to republish the photos; you can find her work here.



Images: Mel Buer




Hai pagato per mesi una VPN che non ha fatto altro che spiarti


La complessa infrastruttura della rete pubblicitaria fraudolenta VexTrio Viper è tornata alla ribalta dopo che i ricercatori di Infoblox hanno rivelato i dettagli di un massiccio schema di app mobile false .

Sotto le mentite spoglie di servizi legittimi – dalle VPN alle utility di pulizia della RAM, dai filtri antispam alle app di incontri – i truffatori hanno inserito programmi dannosi negli store ufficiali di Apple e Google. Questi programmi sono stati distribuiti per conto di presunti sviluppatori diversi, tra cui HolaCode, LocoMind, Hugmi, Klover Group e AlphaScale Media. Il numero totale di download ammonta a milioni.

Una volta installate, queste applicazioni costringevano gli utenti ad accettare condizioni poco trasparenti, li inducevano a fornire dati personali, bombardavano il dispositivo con pubblicità aggressive e ne rendevano difficile la disinstallazione. Ad esempio, un’applicazione chiamata Spam Shield Block, mascherata da antispam, richiedeva immediatamente il pagamento e, se l’utente rifiutava, rendeva insopportabile l’utilizzo del dispositivo a causa di inserti pubblicitari . Gli utenti si lamentavano di prezzi di abbonamento inaffidabili, addebiti multipli e l’impossibilità di disinstallazione: azioni chiaramente mirate al prelievo occulto di fondi.

Tuttavia, le app mobili sono solo la punta dell’iceberg. VexTrio gestisce una rete di attività fraudolente, tra cui sistemi di distribuzione del traffico (TDS) che reindirizzano gli utenti da siti hackerati a pagine false. Questi TDS erano camuffati tramite i cosiddetti smartlink, link intelligenti che rivelano l’indirizzo finale solo all’ultimo momento e si adattano alla vittima: alla sua posizione geografica, al tipo di dispositivo e al browser. Questo consente loro di aggirare i filtri e complica l’analisi da parte degli specialisti.

Il traffico diretto a queste trappole viene inizialmente generato attraverso siti WordPress hackerati, contenenti codice dannoso. I truffatori utilizzano questi siti per distribuire annunci pubblicitari falsi, dalle lotterie alle truffe sulle criptovalute.

È interessante notare che l’organizzazione controlla non solo la parte pubblicitaria, ma anche l’intera catena di distribuzione: invio di e-mail, elaborazione dei dati di pagamento e convalida degli indirizzi postali. Ad esempio, il servizio DataSnap verifica la validità delle e-mail e Pay Salsa riscuote i pagamenti. Lo spam e-mail viene inviato tramite domini falsi che sembrano servizi legittimi come SendGrid e MailGun.

Per nascondere i domini finali e aggirare i controlli, viene utilizzato il servizio IMKLO, che filtra il traffico in entrata e determina se mostrare una pagina ingannevole o nasconderla agli occhi dei controllori. Questa messa a punto rende la campagna praticamente impercettibile.

Gli autori del rapporto sottolineano che il successo di tali schemi è garantito non solo dalla sofisticatezza tecnica, ma anche da una zona grigia legale: i truffatori cercano di evitare virus diretti e azioni dannose, rimanendo nell’ambito dell’inganno e dell’ingegneria sociale, dove la responsabilità si verifica meno spesso.

Il problema principale di questa minaccia è la percezione di tali schemi come “meno pericolosi” delle infezioni da malware. Mentre l’attenzione pubblica è focalizzata su trojan ed exploit, le frodi di massa con abbonamenti, carte di credito e dati personali rimangono nell’ombra. Sviluppare la formazione nel campo dell’igiene digitale e riconsiderare l’atteggiamento nei confronti delle truffe “soft” è uno dei compiti chiave nella lotta contro crimini di questo tipo.

L'articolo Hai pagato per mesi una VPN che non ha fatto altro che spiarti proviene da il blog della sicurezza informatica.



israele vuole liberare gaza... anche i russi vogliono liberare l'ucraina. si vede l'amore per le popolazioni locali da liberare in entrambi i casi. traspare proprio.

reshared this

in reply to simona

ma la verità è che la frase contempla nel finale "...liberare l'ucraina dagli ucraini e e gaza dai gazawi[e palestinesi in toto]ma non gli fanno mai completare la frase, sarà leccaculismo!? 🤔😑🤐



2025 One Hertz Challenge: The Easy Way to Make a Nixie Tube Clock


Let’s say you want to build a Nixie clock. You could go out and find some tubes, source a good power supply design, start whipping up a PCB, and working on a custom enclosure. Or, you could skip all that, and just follow [Simon]’s example instead.

The trick to building a Nixie clock fast is quite simple — just get yourself a frequency counter that uses Nixie tubes for the display. [Simon] sourced a great example from American Machine and Foundry, also known as AMF, the company most commonly associated with America’s love of bowling.

The frequency counter does one thing, it counts the number of pulses in a second. Thus, if you squirt the right number of pulses to represent the time — say, 173118 pulses to represent 5:31 PM and 18 seconds — the frequency counter effectively becomes a clock. To achieve this, [Simon] just hooked an ESP32 up to the frequency counter and programmed it to get the current time from an NTP time server. It then spits out a certain number of pulses every second corresponding to the current time. The frequency counter displays the count… and there you have your Nixie clock!

It’s quick, dirty, and effective, and a sweet entry to our 2025 One Hertz Challenge. We’ve had some other great entries, too, like this nifty hexadecimal Unix clock, and even some non-horological projects, too!

youtube.com/embed/Wd4AiFQjkqA?…

2025 Hackaday One Hertz Challenge


hackaday.com/2025/08/07/2025-o…



oltretutto chi sposta la produzione negli usa sposterà parte di produzione... non può spostare tutto. per importare dall'italia magari materie prime o parti comunque necessarie dovrà lo stesso pagare i dazzi... davvero utile quindi alla fine è comunque un'inculata e non conviene. in un mondo globalizzato come questo è veramente assurda la logica di trump. più tasse per tutti (negli usa)


Federal law closes courthouse doors to incarcerated journalists


These days the president of the United States files frivolous lawsuits at an alarming clip, including against news outlets that displease him. He’s far from the only prominent public figure abusing the federal court system in this way, steering scarce judicial resources away from meritorious lawsuits by ordinary people who have suffered serious damages.

And yet, Congress has not seen fit to pass a federal “anti-SLAPP” law to stop billionaires and politicians from pursuing strategic lawsuits against public participation. But powerless prisoners? That’s another story. If they want access to the federal courts they need to navigate the Prison Litigation Reform Act — a maze of onerous procedural requirements. It’s supposedly intended to stop the courts from being burdened by inmates’ frivolous lawsuits.

We held a webinar to discuss the PLRA’s impact on incarcerated journalists and the journalists on the outside who cover the prison system, featuring Jeremy Busby, a journalist and Freedom of the Press Foundation (FPF) columnist who is incarcerated in Texas, and American Civil Liberties Union attorneys Nina Patel and Corene Kendrick. Patel is senior policy counsel at the ACLU Justice Division and Kendrick is the deputy director of the ACLU’s National Prison Project.

As Kendrick explained, the PLRA originated as one of the Clinton administration’s “tough on crime” initiatives as it pivoted right in preparation for the 1996 presidential election. The law was enacted despite a lack of evidence that incarcerated people file baseless lawsuits any more frequently than anyone else, presidents or otherwise. She said the law “singles out one disfavored group of people and categorically denies them equal access to the courts.”

youtube.com/embed/wiGxxwp8byI?…

She described how the harm extends beyond the impacted litigants, as the kinds of court filings foreclosed by the PLRA are “oftentimes the best way that information about conditions in our nation’s prisons and jails reach the public and members of the media.”

“The PLRA has, in practice, served as a real barrier for journalists to get any sort of information” about facilities that “get billions and billions of dollars a year to lock up human beings,” Kendrick said. “The ability to communicate with the outside world is so circumscribed and is monitored and recorded. And you know, once something gets to a federal court and it’s filed on the docket, it is out there.”

But when the court dismisses a case for procedural reasons without any consideration of whether the claims are true, all journalists are left with are untested allegations that they rarely have the resources to corroborate. “That happens all the time, and unfortunately, and it adversely affects journalists greatly,” Kendrick said.

Lawsuits are also the only recourse available to incarcerated journalists, who often report relentless retaliation when their work upsets prison officials. That’s what happened to Busby when he helped expose deplorable conditions inside the prison where he was housed when the COVID-19 pandemic hit in 2020. Busby said he was transferred to four prisons, each overcrowded with people sick with COVID, before landing in a cell without a mattress or sheets, where he was kept for six weeks. His property was damaged or seized, and he was written bogus disciplinary charges that were later overturned.

He brought a federal lawsuit, but because he was retaliated against in four different prisons, the judge said the PLRA required four separate lawsuits in four different courts. “I wasn’t able to successfully keep up with four active litigations in four different courts in four different counties, from the solitary confinement cell that I was being held in,” Busby explained, resulting in his lawsuits each being dismissed on procedural grounds before the merits of his claims could be adjudicated.

Busby is a college graduate and accomplished writer — if he can’t navigate the PLRA, it is all the more difficult for an average member of the prison population to do so. Even the experienced lawyers on the webinar acknowledged how challenging it can be to comply with the PLRA when representing their incarcerated clients. Incarcerated litigants, Busby noted, must also pay court fees — in his case, a $400 fee became $1,600 when his lawsuit was split into four.

“You don’t get paid for work here in Texas, and so most guys, they don’t even want the $400 thing against their account because their family members can maybe send $20 for toothpaste and deodorant every month or so, or every two or three months, and they don’t want to sacrifice their deodorant and toothpaste money to pursue this lawsuit,” he said.

So what’s the point of the PLRA? As Patel noted, “The courts are well equipped to throw out lawsuits that are frivolous,” and do so every day in cases involving non-incarcerated people. Patel believes the real problem the PLRA is meant to address isn’t that incarcerated people file so many invalid claims — it’s that they file so many valid ones.

With around two million people incarcerated in the United States, “a functional system where someone can go to the courts and have their constitutional violations in prison litigated and then compensated would break most prison systems in this country,” Patel explained. “That is the dirty truth of the PLRA.”

She added, “Everyone knows, and it’s not a secret, that it would bankrupt the system, and it would break it, and that we couldn’t do what we do in this country, which is lead the world in mass incarceration.”

Watch the full webinar here, and subscribe to our newsletters to get notice of future events.

Note: FPF Advocacy Director Seth Stern, who authored this article and moderated the webinar, is on the board of Busby’s nonprofit organization, JoinJeremy.


freedom.press/issues/federal-l…



ma che fine hanno fatto tutti quelli che prima delle elezioni osannavano tanto trump... negando persino i fatti tipo il suo tentato colpo di stato di 4 anni prima... eh beh... adesso che ha vinto siete tutti contenti? coglioni... bella la vostra idea di destra...


The 64-Degree Egg, And Other Delicious Variants


Many of us have boiled an egg at some point or another in our lives. The conventional technique is relatively straightforward—get the water boiling, drop the egg in, and leave it for a certain period of time based on the desired consistency. If you want the yolk soft, only leave it in for a few minutes, and if you want it hard, go longer.

Ultimately, though, this is a relatively crude system for controlling the consistency of the final product. If you instead study the makeup of the egg, and understand how it works, you can elicit far greater control over the texture and behavior of your egg with great culinary benefits.

Knockin’ On 64

Traditional boiled eggs cooked for 4 minutes, 7 minutes, and 9 minutes. When cooking in boiling water, temperatures are high enough to create a fully firm white in just a few minutes. Credit: Wikisearcher, CC BY-SA 3.0
It all comes down to the physical basics of what goes on when we cook an egg. Whether frying, poaching, or simply boiling, one thing is the same—the liquid contents of the egg turn more solid with heat. This is because the heat causes the proteins in the egg white and egg yolk to denature—they untangle and unravel from their original folded structure into a new form which is the one we prefer to eat.

Physical chemist Hervé This is widely credited as revolutionizing the way we think about cooking eggs, through his careful study of how temperature affected the cooking process of a “boiled” egg. He invented the idea of the “6X °C egg”—a method of cooking eggs to generate a pleasant, smooth consistency by carefully controlling how the proteins denature. His work has since been expanded upon by many other researchers eager to untangle the mysteries of how egg proteins behave with heat.

Different purveyors of these theories each have their own ideals—but it’s common to hear talk of the “64-degree egg” or “65-degree egg.” To create such an egg, one typically uses a sous vide water bath set at a very precise temperature, in order to cook the egg in as controlled a manner as possible. The process is a relationship between time and temperature, and so the cooking times used are a lot longer than with boiling water at 100 C—immersing the eggs for 60 minutes or more is typical. This also helps to ensure the eggs are safe to eat, with the lower temperature needing a longer time to quash potentially harmful bacteria.

Sous Vide Eggs
byu/passswordistaco insousvide

Enthusiasts share cooking times and temperatures along with qualitative results, ever searching for the ideal egg.

The results of such a process? Eggs cooked in this manner are prized for their tender yolks and an overall consistency not dissimilar to custard. The process denatures the yolk and white proteins just enough to create an incredibly smooth egg with luxurious mouthfeel, and they’re often cited as melting in the mouth.
The onsen egg from Japan is a traditional egg dish cooked at approximately 70 C for 30 to 40 minutes, similarly creating an egg with a luxurious consistency. Credit: Blue Lotus, CC BY 2.0
The only real drawback? It’s typical to get some runny whites left over, since the low cooking temperature isn’t enough to fully denature the proteins in that part of the egg. These eggs were once a neat science experiment from the world of molecular gastronomy, with the cooking method since becoming widespread with restaurants and sous vide enthusiasts around the world.

There are even more advanced techniques for those committed to egg perfection. A research team from the University of Naples, Italy, determined that cycling an egg between two pans—one with boiling water, the other at 30 C—allowed both the yolk and the white to each reach target doneness. To get the whites to around 85 C while holding the yolk at 65 C, the team used the technique of swapping between pans to get both to their ideal temperature by modelling heat transfer through the egg. This controls the amount of heat transferred to the yolk deeper inside the egg, ensuring that it’s not overcooked in the effort to get the whites to set. Ultimately, though, this process requires a great deal of work swapping the egg back and forth for a full 30 minutes.

Few make that sort of commitment to eggcellence.

Featured image, the imaginatively named “Selective Photography of Breakfast in Plate” by [Krisztina Papp].


hackaday.com/2025/08/07/the-64…



Perché i dazi di Trump fanno esultare Tsmc

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Tsmc sarà esentata dai dazi al 100 per cento sui microchip imposti da Trump. Ottima notizia per l'azienda e per l'intera economia di Taiwan. Ma le tensioni commerciali con l'America non sono risolte.




Chi sono i colossi della finanza che sostengono la Dsr Bank

@Notizie dall'Italia e dal mondo

Un gruppo di grandi istituzioni finanziarie internazionali, tra cui J.P. Morgan Chase, Ing e Commerzbank, ha deciso di accettare la sfida della banca multilaterale pensata per portare avanti i progetti di difesa dell’Europa e dei suoi alleati. La Defence, Security and Resilience Bank (Dsrb) infatti si pone l’obiettivo



Preservationists at the Video Game History Foundation purchased the rights to Computer Entertainer, the first video game magazine ever written and uploaded it for free.#News #VideoGames #archiving


Archivists Let You Now Read Some of the First Ever Reviews of Mario and Zelda


Some of the first reviews ever written for the original Legend of Zelda and Super Mario Bros. have been digitized and published by the Video Game History Foundation. The reviews appeared in Computer Entertainer, an early video game magazine that ran from 1982 to 1990. The archivists at the Foundation tracked down the magazine’s entire run and have published it all online under a Creative Commons license.

Computer Entertainer has a fascinating history. It was one of the only magazines to cover video games during the market crash of the mid 1980s. “Simply put, there weren't other video game magazines in this era, at least in the United States,” Phil Salvador, the Library Director at the VGHF, told 404 Media. “In many cases, this is the only American coverage we have for this period.”
playlist.megaphone.fm?p=TBIEA2…
“If we want to understand video game history, we need more than the games themselves. We need to understand how they were talked about and how they were made. Primary sources from the early years of the video game industry like Computer Entertainer are scarce. They give us insight into the story of video games that there's no way to reproduce,” Salvador said.
Image via VGHF.
Computer Entertainer was the newsletter for the Video Take-Out, a company that sold video games through the mail. “Because they were focused on retail products, they kept on top of the video game release calendar in a way that no other enthusiast magazine did in the 1980s,” Salvador said. “This magazine is one of the only reliable sources of American release dates for computer and console games during this era. Look up any console game from the 1980s on Wikipedia, and chances are, the American release date in the article comes from Computer Entertainer.”
youtube.com/embed/YnckC-JuOR0?…
Digging through the archives, I found the original Legend of Zelda review and read through a year’s worth of hype and handwringing leading up to its release. Computer Entertainer was on hand at CES to talk to the unproven Nintendo in February 1987. Zelda was already out in Japan, where it ran on the disk-based Famicom system.

The CE write-up noted that the NES was a cartridge system and that Nintendo had to make unheard of adjustments to make the game work right. “A Nintendo spokesperson told us that they have included a lithium battery with a 5-year life span in the cartridge to allow it to save information you need, so the disk drive is not needed,” CE wrote.
Image via VGHF.
Convincing Americans to buy a Famicom-style disk drive after they’d already bought the NES was thought to be a hard sell. “We do feel, however, that it is just a question of time before Nintendo introduces the disk drive in the U.S,” CE said. “Also, for the avid long-term gamer (count all our readers in that category!), the 5-year battery could prove frustrating as, when the battery dies, so does all the character information that has been stored on the cartridge.” CE needn’t have worried. Many of those batteries are still working today, almost 40 years later, and there’s a robust aftermarket in replacement parts when they fail.

Legend of Zelda finally came out in August of 1987 and CE gave it a glowing review, rating it 3.5 out of 4 stars. In the same issue, it gave Leisure Suit Larry and the Land of the Lounge Lizards a perfect 4 out of 4 stars. “There’s certainly no socially redeeming value to the game, which is what makes it so much fun,” CE said of the adventure game that would have nowhere near the cultural or social impact of Link and Zelda.
Image via VGHF.
“It's a totally different perspective to see someone trying towrap their head around the original Super Mario Bros., or expressing skepticism aboutthe idea of Nintendo selling a game console in the United States,” Salvador said.

The 1980s was a different era of games writing. “[Computer Entertainer] covered video and computer games as a function of their retail business to help customers better understand the game market,” Salvador said. “Being able to look back on what retailers thought about the game business back in the 1980s is a huge historical boon, but today, there's understandably more questions about the role of game criticism. Does it still make sense to cover games the same way Computer Entertainer did 40 years ago?”




Fregate high-tech dal Giappone. Canberra punta sulla classe “Mogami” per la sua Marina Militare

@Notizie dall'Italia e dal mondo

La Marina Australiana ha scelto la Mitsubishi per costruire la sua prossima generazione di fregate. Pochi giorni fa, il ministero della Difesa australiano ha infatti annunciato che la versione potenziata della classe “Mogami”




Roberto Natale (cda Rai): subito una legge che rispetti l’Emfa


@Giornalismo e disordine informativo
articolo21.org/2025/08/roberto…
“E’ vitale per il servizio pubblico che arrivi al più presto una legge di attuazione del Media Freedom Act europeo, in vigore da domani anche nella parte che riguarda i servizi pubblici. Non



Buying Large LiFePO4 Batteries: How Cheap is Too Cheap?


It’s a well-known factoid that batteries keep getting cheaper while capacity increases. That said, as with any market that is full of people who are hunting for that ‘great deal’, there are also many shady sellers who will happily sell you a product that could be very dangerous. Especially in the case of large LiFePO4 (LFP) batteries, considering the sheer amount of energy they can contain. Recently [Will Prowse] nabbed such a $125, 100 Ah battery off Amazon that carries no recognizable manufacturer or brand name.
Cheap and cheerful, and probably won't burn down the place. (Credit: Will Prowse, YouTube)Cheap and cheerful, and probably won’t burn down the place. (Credit: Will Prowse, YouTube)
If this battery works well, it could be an amazing deal for off-grid and solar-powered applications. Running a battery of tests on the battery, [Will] found that the unit’s BMS featured no over-current protection, happily surging to 400 A, with only over-temperature protection keeping it from melting down during a discharge scenario. Interestingly, under-temperature charge protection also worked on the unit.

After a (safe) teardown of the battery the real discoveries began, with a row of missing cells, the other cells being re-sleeved and thus likely salvaged or rejects. Fascinatingly, another YouTuber did a similar test and found that their (even cheaper) unit was of a much lower capacity (88.9 Ah) than [Will]’s with 98 Ah and featured a completely different BMS to boot. Their unit did however feature something of a brand name, though it’s much more likely that these are all just generic LFP batteries that get re-branded by resellers.

What this means is that these LFP batteries may be cheap, but they come with cells that are likely to be of questionable quality, featuring a BMS that plays it fast and loose with safety. Although [Will] doesn’t outright say that you shouldn’t use these batteries, he does recommend that you install a fuse on it to provide some semblance of over-current protection. Keeping a fire extinguisher at hand might also be a good idea.

youtube.com/embed/r9Ob5kk3qoQ?…


hackaday.com/2025/08/07/buying…



More than 130,000 Claude, Grok, ChatGPT, and Other LLM Chats Readable on Archive.org#News


More than 130,000 Claude, Grok, ChatGPT, and Other LLM Chats Readable on Archive.org


A researcher has found that more than 130,000 conversations with AI chatbots including Claude, Grok, ChatGPT, and others are discoverable on the Internet Archive, highlighting how peoples’ interactions with LLMs may be publicly archived if users are not careful with the sharing settings they may enable.

The news follows earlier findings that Google was indexing ChatGPT conversations that users had set to share, despite potentially not understanding that these chats were now viewable by anyone, and not just those they intended to share the chats with. OpenAI had also not taken steps to ensure these conversations could be indexed by Google.

“I obtained URLs for: Grok, Mistral, Qwen, Claude, and Copilot,” the researcher, who goes by the handle dead1nfluence, told 404 Media. They also found material related to ChatGPT, but said “OpenAI has had the ChatGPT[.]com/share links removed it seems.” Searching on the Internet Archive now for ChatGPT share links does not return any results, while Grok results, for example, are still available.

Dead1nfluence wrote a blog post about some of their findings on Sunday and shared the list of more than 130,000 archived LLM chat links with 404 Media. They also shared some of the contents of those chats that they had scraped. Dead1nfluence wrote that they found API keys and other exposed information that could be useful to a hacker.
playlist.megaphone.fm?p=TBIEA2…
“While these providers do tell their users that the shared links are public to anyone, I think that most who have used this feature would not have expected that these links could be findable by anyone, and certainly not indexed and readily available for others to view,” dead1nfluence wrote in their blog post. “This could prove to be a very valuable data source for attackers and red teamers alike. With this, I can now search the dataset at any time for target companies to see if employees may have disclosed sensitive information by accident.”

404 Media verified some of dead1influence’s findings by discovering specific material they flagged in the dataset, then going to the still-public LLM link and checking the content.

💡
Do you know anything else about this? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

Most of the companies whose AI tools are included in the dataset did not respond to a request for comment. Microsoft which owns Copilot acknowledged a request for comment but didn't provide a response in time for publication. A spokesperson for Anthrophic, which owns Claude, told 404 Media: “We give people control over sharing their Claude conversations publicly, and in keeping with our privacy principles, we do not share chat directories or sitemaps with search engines like Google. These shareable links are not guessable or discoverable unless people choose to publicize them themselves. When someone shares a conversation, they are making that content publicly accessible, and like other public web content, it may be archived by third-party services. In our review of the sample archived conversations shared with us, these were either manually requested to be indexed by a person with access to the link or submitted by independent archivist organizations who discovered the URLs after they were published elsewhere across the internet first.” 404 Media only shared a small sample of the Claude links with Anthrophic, not the entire list.

Fast Company first reported that Google was indexing some ChatGPT conversations on July 30. This was because of a sharing feature ChatGPT had that allowed users to send a link to a ChatGPT conversation to someone else. OpenAI disabled the sharing feature in response. OpenAI CISO Dane Stuckey said in a previous statement sent to 404 Media: “This was a short-lived experiment to help people discover useful conversations. This feature required users to opt-in, first by picking a chat to share, then by clicking a checkbox for it to be shared with search engines.”

A researcher who requested anonymity gave 404 Media access to a dataset of nearly 100,000 ChatGPT conversations indexed on Google. 404 Media found those included the alleged texts of non-disclosure agreements, discussions of confidential contracts, and people trying to use ChatGPT for relationship issues.

Others also found that the Internet Archive contained archived LLM chats.


#News


Next PPI Board Meeting, August 26th at 20:00 UTC


Ahoy Pirates,

Our next PPI board meeting will take place on 26.08.2025 at 14:00 UTC / 16:00 CEST.

All official PPI proceedings, Board meetings included, are open to the public. Feel free to stop by. We’ll be happy to have you.

Where:jitsi.pirati.cz/PPI-Board

Minutes of the meeting: wiki.pp-international.net/wiki…

Agenda: Pad: etherpad.pp-international.net/…

All of our meetings are posted to our calendar: pp-international.net/calendar/

We look forward to seeing visitors.

Thank you for your support,

The Board of PPI


pp-international.net/2025/08/n…




La fiducia degli americani nell’AI sta diminuendo ed è una questione di sicurezza nazionale


La fiducia degli americani nell’intelligenza artificiale sta diminuendo, nonostante l’accelerazione dei progressi globali in questo campo. Ciò indica un potenziale problema di sicurezza nazionale: legislatori di ogni partito, leader del settore, think tank e altri hanno avvertito che rimanere indietro rispetto alla Cina in materia di intelligenza artificiale metterebbe gli Stati Uniti in una posizione di svantaggio. Un sentimento pubblico negativo potrebbe minare il sostegno del Congresso e finanziario alla ricerca e allo sviluppo in questo campo.

Ma alcune aziende di intelligenza artificiale stanno modificando i loro prodotti per dare ai clienti governativi un maggiore controllo sul comportamento dei modelli, sull’input dei dati e persino sulla fonte di energia che alimenta il sistema.

Questo potrebbe placare l’opinione pubblica?

Un recente accordo dimostra fino a che punto le aziende siano disposte a spingersi per soddisfare le esigenze del governo. Per miliardi di persone, ChatGPT è un’astrazione visualizzata tramite il browser web. Ma all’inizio di questo mese, il chatbot basato sull’intelligenza artificiale ha assunto una forma fisica quando OpenAI ha consegnato diversi hard disk contenenti i pesi del modello o3 al Los Alamos National Laboratory. Il laboratorio mira a utilizzarli per esaminare dati classificati alla ricerca di informazioni sulla fisica delle particelle che potrebbero rimodellare la ricerca di energia e lo sviluppo di armi nucleari.

Quei dischi rigidi erano i “più preziosi” sulla Terra, l’incarnazione fisica della valutazione di 300 miliardi di dollari di OpenAI, ha detto a Defense One Katrina Mulligan, responsabile governativa dell’azienda, in occasione di un recente evento sull’intelligenza artificiale a Washington, DC. “Stiamo perdendo soldi con il nostro accordo con i laboratori nazionali”, ha detto Mulligan.

Pochi giorni dopo, OpenAI ha annunciato un contratto da 200 milioni di dollari con il Pentagono per “prototipare come l’intelligenza artificiale di frontiera possa trasformare le sue operazioni amministrative, dal miglioramento del modo in cui i militari e le loro famiglie ricevono assistenza sanitaria, alla semplificazione del modo in cui analizzano i dati di programma e acquisizione, fino al supporto alla difesa informatica proattiva. Tutti i casi d’uso devono essere coerenti con le politiche e le linee guida di OpenAI”.

All’AI Expo dello Special Competitive Studies Project a Washington, DC, un rappresentante di OpenAI ha dimostrato come gli strumenti dell’azienda possano essere utili per compiti di sicurezza nazionale: geolocalizzazione di immagini senza indizi evidenti, scansione dei registri di Telegram alla ricerca di indicatori di attività informatica o identificazione dell’origine di parti di droni recuperate dal campo di battaglia.

Il responsabile della demo ha affermato che i più recenti modelli di ragionamento dell’azienda non solo superano le versioni precedenti, ma ora consentono anche l’inserimento sicuro di dati classificati in conformità con le linee guida del Dipartimento della Difesa. A differenza di ChatGPT, rivolto al pubblico, la versione governativa mostra anche agli utenti come il modello prioritizza le fonti di dati, offrendo una trasparenza che consente agli analisti di perfezionare la logica e comprendere come il programma sia giunto alle conclusioni a cui è giunto.

Questa visibilità è essenziale per l’uso ai fini della sicurezza nazionale, ha affermato Mulligan, molto più che per i consumatori che vogliono risposte e raramente chiedono come vengono realizzati.

“Produce una catena di pensiero piuttosto dettagliata che ti dice come è arrivato alla sua conclusione, quali informazioni ha preso in considerazione che non erano possibili nel paradigma precedente”, ha detto, aggiungendo che le persone hanno creduto a lungo che tali modelli semplicemente non potessero essere spiegati, pensando che “questi modelli sarebbero sempre stati una scatola nera”.

La spiegabilità, la portabilità dei dati e il controllo delle infrastrutture locali, che consentono ai laboratori di eseguire modelli sui propri supercomputer, stanno emergendo come requisiti di base per l’uso dell’intelligenza artificiale nella pubblica amministrazione. Dare agli utenti maggiore autonomia crea fiducia.

OpenAI non è l’unica. Amazon Web Services sta silenziosamente diventando un attore fondamentale nell’intelligenza artificiale per la difesa. Ha recentemente rilasciato una versione del suo servizio Bedrock, che consente agli utenti di creare applicazioni di intelligenza artificiale generativa con un menu di modelli fondamentali, con sicurezza di livello classificato per i clienti del Dipartimento della Difesa.

Ma mentre la fiducia tra governo e Silicon Valley si sta rafforzando attorno all’obiettivo comune di progredire nell’implementazione dell’intelligenza artificiale, l’opinione pubblica si sta muovendo nella direzione opposta.

Un sondaggio condotto da Edelman a marzo ha mostrato che la fiducia nell’IA è scesa dal 50% al 35% dal 2019. E la sfiducia attraversa tutti gli schieramenti politici: solo il 38% dei democratici si fida dell’IA, rispetto al 25% degli indipendenti e al 24% dei repubblicani. Questo segue altri sondaggi che hanno mostrato un sentimento pubblico sempre più negativo nei confronti dell’IA, nonostante i professionisti che hanno integrato l’IA nel loro lavoro segnalino livelli di prestazioni più elevati.

Ma la vera divergenza è geopolitica. “La fiducia nell’intelligenza artificiale negli Stati Uniti e in tutto il mondo occidentale è bassa, mentre in Cina e nel resto del mondo in via di sviluppo si attesta intorno al 75%.”, ha affermato Mulligan.

Teme che queste disparità si traducano in reali divari nell’adozione, con la Cina in vantaggio in termini di produttività, crescita economica e qualità della vita.

L'articolo La fiducia degli americani nell’AI sta diminuendo ed è una questione di sicurezza nazionale proviene da il blog della sicurezza informatica.



Emfa inattuato in Italia, rivolta di associazioni e opposizione


@Giornalismo e disordine informativo
articolo21.org/2025/08/emfa-in…
“Da domani l’Italia entrerà ufficialmente in procedura d’infrazione per violazione dell’European Media Freedom Act (EMFA), la normativa europea che tutela l’indipendenza e il pluralismo




Dire Wolf e SNOWFANG: la nuova minaccia ransomware scritta in Go


@Informatica (Italy e non Italy 😁)
Negli ultimi mesi, il gruppo ransomware Dire Wolf ha fatto la sua comparsa nel panorama cybercriminale, distinguendosi per l’uso di un malware chiamato SNOWFANG, sviluppato in linguaggio Go. Questo ransomware, attivo da maggio 2025, ha già colpito numerose organizzazioni in settori



VRML and the Dream of Bringing 3D to the World Wide Web


You don’t have to be a Snow Crash or Tron fan to be familiar with the 3D craze that characterized the rise of the Internet and the World Wide Web in particular. From phrases like ‘surfing the information highway’ to sectioning websites as if to represent 3D real-life equivalents or sorting them by virtual streets like Geocities did, there has always been a strong push to make the Internet a more three-dimensional experience.

This is perhaps not so strange considering that we humans are ourselves 3D beings used to interacting in a 3D world. Surely we could make this fancy new ‘Internet’ technology do something more futuristic than connect us to text-based BBSes and serve HTML pages with heavily dithered images?

Enter VRML, the Virtual Reality Modelling Language, whose 3D worlds would surely herald the arrival of a new Internet era. Though neither VRML nor its successor X3D became a hit, they did leave their marks and are arguably the reason why we have technologies like WebGL today.

Inspired By Wheels

View of CyberTown's VRML-based Plaza and interface.View of CyberTown’s VRML-based Plaza and interface.
With an internet-based virtual reality a highly topic concept, David Raggett from Hewlett Packard Laboratories submitted a paper back in 1994 titled Extending WWW to support Platform Independent Virtual Reality. This imagined a virtual reality layer to the WWW by the end of the millennium featuring head-mounted displays (HMDs) and tracking of a user’s limbs to fully integrate them into this virtual world with potentially realistic physics, sound, etc.

Describing these virtual worlds would be at the core of this VR push, with SGML (standardized general markup language) forming the basis of such world definitions, much like how HTML is a specialized form of SGML to define the structure and layout of a document. The newly minted VRML would thus merely define 3D worlds rather than 2D documents, with both defining elements and their positioning.

Although nothing revolutionary by itself – with games and 3D modeling software by then having done something similar with their own file formats to define 3D models and worlds for years already – VRML would provide a cross-platform, fully open and independent format that was specifically made for the purpose of this online VR experience.

All Starts With Polygons


The interesting thing about VRML is perhaps that it was pushing for a shared online 3D experience years before the first commercially successful MMORPG came onto the scene in 1999 in the form of EverCra^WEverQuest. VRML was pitched in 1994 and by 1995 the very RPG-like MMO experience called Colony City (later CyberTown) was launched. This created a virtual world in which members could hold jobs, earn virtual currency and purchase 3D homes and items that were all defined in VRML.

CyberTown endured until 2012 when the company behind it shut down, but there’s an ongoing push to revive CyberTown, with the revival project‘s GitHub project giving a glimpse at the preserved VRML-based worlds such as the home world. These .wrl files (short for ‘world’) use the VRML version 2.0 standard, which was the 1997 version of VRML that got turned into an ISO standard as ISO/IEC 14772:1997, with the specification itself being readily available over at the Web3D website.

As defined in part 1 of the specification, each VRML file:

  1. implicitly establishes a world coordinate space for all objects defined in the file, as well as all objects included by the file;
  2. explicitly defines and composes a set of 3D and multimedia objects;
  3. can specify hyperlinks to other files and applications;
  4. can define object behaviors.

VRML got combined with the Humanoid Animation (HAnim) standard to make realistic humanoid articulation and movement possible. Much like HTML documents, it are often the external resources like textures that determines the final look, but basic materials can be defined in VRML as well.

A very basic example of VRML is provided on the Wikipedia entry for a simple triangle:
#VRML V2.0 utf8

Shape {
geometry IndexedFaceSet {
coordIndex [ 0, 1, 2 ]
coord Coordinate {
point [ 0, 0, 0, 1, 0, 0, 0.5, 1, 0 ]
}
}
}

The interesting part comes when the material and texture appearance properties are set for a shape, albeit with basic lighting, no shaders and similar advanced features. All of these would see major improvements by the late 90s as consumer graphic cards became commonplace, especially during 1999 when we saw not only NVidia’s impressive RIVA TNT2, but especially its revolutionary Geforce 256 GPU with its hardware transform and lighting engine.

At this point video games began to look ever more realistic – even on PC – and with the release of new MMORPGs like 2004’s World of Warcraft and EverQuest II, the quirky and very dated look of VRML-based worlds made it clear that the ‘3D WWW’ dream in the browser was effectively dead and the future was these MMORPGs and kin.

It also seems fair to say that the fact that these games came with all of the assets on installation discs was a major boon over downloading hundreds of megabytes worth of assets via an anemic dial-up or crippled cable internet connection of the late 90s and early 2000s.

A Solution In Search Of A Problem

Virtual Environment Reality workstation technology in 1989 (helmet & gloves) (Credit: NASA)Virtual Environment Reality workstation technology in 1989 (helmet & gloves) (Credit: NASA)
One could argue that science-fiction like Snow Crash provides us with the most ideal perspective of a VR layer on top of the Internet, where its Metaverse provides a tangible addition to reality. This same concept of a metaverse where the mind is no longer constrained by the limitations of the body is found in animated features like Ghost in the Shell and Serial Experiments Lain, each of which feature digitalized, virtual worlds that unchain the characters while creating whole new worlds previously considered impossible.

In these worlds characters can find information much faster, move through digital currents like fish in water, inhibit the digital brains of Internet-connected devices, and so on. Meanwhile back in reality the way we humans interact with virtual worlds has barely changed from the 1980s when NASA and others were experimenting with VR interface technologies.

Why move clumsily through a faux 3D environment with cumbersome input devices strapped to your body and perhaps a display pushed up to your noggin when you can just use mouse and keyboard to tappity-tap in some commands, click a hyperlink or two and observe the result on your very much 2D monitor?

As around 2003 the latest web-based VR world hype came in the form of Second Life, it followed mostly the same trajectory as CyberTown before it, while foregoing anything like VRML. After some companies briefly had a presence in Second Life before leaving, it became a ghost town just in time for Facebook to rename itself into Meta and try its hand at the very creatively named Metaverse. Despite throwing billions of dollars at trying to become at least as popular as CyberTown, it mostly left people with the feeling of what the point of such a ‘metaverse’ is.

Never Stop Dreaming


The Web3D Consortium was set up in 1997 along with the standardization of VRML, when it was called the VRML Consortium. Its stated goal is to develop and promote open standards for 3D content and services on the web. It currently pushes the somewhat newer X3D standard, which among other things supports multiple syntax types ranging from XML to classical VRML. It also supports modern physically based rendering (PBR), which puts it at least somewhat in the same ballpark as modern 3D graphic renderers.

Meanwhile there is the much more significant WebGL, which was originally created by Mozilla, but has since found a loving home at Khronos. This uses the canvas feature of HTML 5 to render 2D and 3D graphics using OpenGL ES, including support for shaders. The proposed WebGPU would merge the web browser and GPUs tighter still, albeit with its own shader language instead of the standard OpenGL ES one.

With these new technologies it would seem that rendering prettier 3D worlds in browsers has become easier than ever, even as the dream of bringing 3D worlds to the WWW seems as distant as the prospect of VR games taking the world of gaming by storm. Barring major human-computer interface advances, the WWW will remain at its optimum with keyboard and mouse, to browse through 2D documents. This alongside 3D game worlds controlled with the same keyboard and mouse, with said worlds rendered on a very much 2D surface.

Here’s to dreaming that maybe some of those exciting aspects of sci-fi will one day become science-fact, and to those who strive to make those dreams reality, in lieu of simply being given a nanotech-based Primer as a shortcut.


hackaday.com/2025/08/07/vrml-a…

#VRML



Vulnerabilità critiche in Trend Micro Apex One: aggiornamento urgente


Un bollettino di sicurezza urgente è stato diramato da Trend Micro al fine di informare i propri clienti circa delle vulnerabilità critiche, sfruttate attivamente dai malintenzionati, riguardanti l’esecuzione di codice remoto nella console di gestione Apex One on-premise.

Le falle di sicurezza, identificate come CVE-2025-54948 e CVE-2025-54987, interessano la Trend Micro Apex One Management Console in esecuzione sui sistemi Windows. Entrambe le vulnerabilità derivano da debolezze nell’iniezione di comandi che consentono ad aggressori remoti pre-autenticati di caricare codice dannoso ed eseguire comandi arbitrari sulle installazioni interessate.

L’azienda ha confermato che è stato osservato almeno un caso di sfruttamento attivo, il che rende urgente l’adozione di misure di protezione immediate. Queste vulnerabilità prendono di mira specificamente Trend Micro Apex One 2019 Management Server versione 14039 e precedenti.

ID CVEPunteggio CVSSTipo di debolezzaRiferimento ZDIVettore di attacco
CVE-2025-549489.4 (Critico)CWE-78: Iniezione di comandi del sistema operativoZDI-CAN-27834Basato sulla rete, nessuna autenticazione richiesta
CVE-2025-549879.4 (Critico)CWE-78: Iniezione di comandi del sistema operativoZDI-CAN-27855Basato sulla rete, diversa architettura della CPU

Il secondo CVE rappresenta essenzialmente la stessa vulnerabilità, ma prende di mira un’architettura di CPU diversa, ampliando la potenziale superficie di attacco per gli autori di attacchi dannosi che cercano di compromettere l’infrastruttura di sicurezza aziendale.

Riconoscendo la natura critica di queste falle, Trend Micro ha rilasciato uno strumento di mitigazione di emergenza denominato “FixTool_Aug2025” per fornire una protezione immediata contro gli exploit noti.

Tuttavia, questa soluzione a breve termine presenta un compromesso operativo significativo: disabilita la funzione Remote Install Agent, impedendo agli amministratori di distribuire gli agenti direttamente dalla console di gestione .

I metodi di distribuzione alternativi, come il percorso UNC o i pacchetti agent, rimangono inalterati.

L’azienda ha sottolineato che, sebbene lo strumento di correzione fornisca una protezione completa contro gli exploit noti, è prevista una patch critica completa verso la metà di agosto 2025.

L'articolo Vulnerabilità critiche in Trend Micro Apex One: aggiornamento urgente proviene da il blog della sicurezza informatica.



Dopo il mio articolo sulla formazione sistemica, un intervento di Wolfgang Ulrich che dice la sua sull'argomento. C'è una affinità interessante fra clinici che perseguono il progetto di una connessione fra il sé professionale e quello, diciamo, privato, in un modo lontano e alternativo alle logiche della cosiddetta "integrazione".
Dal mio blog (che mi procura tante soddisfazioni).

massimogiuliani.it/blog/2025/0…