Salta al contenuto principale



Il Socialismo in America Latina


altrenotizie.org/in-evidenza/1…




2025 One Hertz Challenge: Atomic Decay Clock is Accurate But Not Precise


At this point, atomic clocks are old news. They’ve been quietly keeping our world on schedule for decades now, and have been through several iterations with each generation gaining more accuracy. They generally all work under the same physical principle though — a radio signal stimulates a gas at a specific frequency, and the response of the gas is used to tune the frequency. This yields high accuracy and high precision — the spacing between each “tick” of an atomic clock doesn’t vary by much, and the ticks cumulatively track the time with very little drift.

All of this had [alnwlsn] thinking about whether he could make an “atomic” clock that measures actual radioactive decay, rather than relying on the hyperfine transition states of atoms. Frustratingly, most of the radioactive materials that are readily available have pretty long half-lives — on the order of decades or centuries. Trying to quantify small changes in the energy output of such a sample over the course of seconds or minutes would be impossible, so he decided to focus on the byproduct of decay — the particles being emitted.

He used a microcontroller to count clicks from a Geiger-Müller tube, and used the count to calculate elapsed time by multiplying by a calibration factor (the expected number of clicks per second). While this is wildly inaccurate in the short term (he’s actually used the same system to generate random numbers), over time it smooths out and can provide a meaningful reading. After one year of continuous operation, the counter was only off by about 26 minutes, or 4.4 seconds per day. That’s better than most mechanical wristwatches (though a traditional Rubidium atomic clock would be less than six milliseconds off, and NIST’s Strontium clock would be within 6.67×10-11 seconds).

The end result is a probabilistic radiometric timepiece that has style (he even built a clock face with hands, rather than just displaying the time on an LCD). Better yet, it’s got a status page where you can check on on how it’s running. We’ve seen quite a few atomic clocks over the years, but this one is unique and a great entry into the 2025 One Hertz Challenge.

2025 Hackaday One Hertz Challenge


hackaday.com/2025/08/19/2025-o…




160.000 documenti rubati.


@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/160000/
160.000 (and counting) scansioni integrali ad alta risoluzione di documenti di identità (cie, patenti, passaporti) sono stati rubati da una decina (and counting) di hotel e, in queste ore, sono attivamente sfruttati per ricatti, truffe, furti di identità e altre azioni criminali. Ma



Come funziona una VPN? Ma, soprattutto, serve davvero?


Grazie ad un commento di @ricci ad un altro post ho trovato questo articolo di Dennis Schubert che secondo me vale la mezz'ora che serve per leggerlo (thanks a lot to @Dennis Schubert ).

overengineer.dev/blog/2019/04/…

#VPN



trump... un uomo di pace che sostiene il genocidio palestinese... che originale.
in reply to simona

portare la pace nel mondo con i dazi... come no. pure in paesi poverissimi in africa.


La Lega vuole tacitare il dissenso contro Netanyahu


@Giornalismo e disordine informativo
articolo21.org/2025/08/la-lega…
La lotta contro l’antisemitismo non è solo legittima. È necessaria. Come sono necessarie tutte le battaglie contro ogni razzismo e ogni forma di discriminazione. La proposta di Legge depositata dalla Lega, primo



Food Irradiation Is Not As Bad As It Sounds


Radiation is a bad thing that we don’t want to be exposed to, or so the conventional wisdom goes. We’re most familiar with it in the context of industrial risks and the stories of nuclear disasters that threaten entire cities and contaminate local food chains. It’s certainly not something you’d want anywhere near your dinner, right?

You might then be surprised to find that a great deal of research has been conducted into the process of food irradiation. It’s actually intended to ensure food is safer for human consumption, and has become widely used around the world.

Drop It Like It’s Hot


Food irradiation might sound like a process from an old science fiction movie, but it has a very real and very useful purpose. It’s a reliable way to eliminate pathogens and extend shelf life, with only a few specific drawbacks. Despite being approved by health organizations worldwide and used commercially since the 1950s, it remains one of the most misunderstood technologies in our food system.
The basic concept is simple—radiation can kill pathogens while leaving the food unharmed. Credit: IAEA
The fundamental concept behind food irradiation is simple. Food is exposed to ionizing radiation in controlled doses in order to disrupt the DNA of harmful microorganisms, parasites, and insects. The method is both useful in single serving contexts, such as individual meal rations, as well as in bulk contexts, such as shipping large quantities of wheat. Irradiation can outright kill bacteria in food that’s intended for human consumption, or leave pests unable to reproduce, ensuring a shipment of grain doesn’t carry harmful insects across national borders.

It’s important to note that food irradiation doesn’t make the food itself radioactive. This process doesn’t make food radioactive any more than a chest X-ray makes your body radioactive, since the energy levels involved simply aren’t high enough. The radiation passes through the food, breaking the chemical bonds that make up the genetic material of unwanted organisms. It effectively sterilizes or kills them, ideally without significantly changing the food itself. It also can be used to reduce sprouting of some species like potatoes or onions, and also delay ripening of fruits post-harvest, thanks to its effect on microbes and enzymes that influence these processes.

The concept of food irradiation dates back a long way, far beyond what we would typically call the nuclear age. At the dawn of the 20th century, there was some interest in using then-novel X-rays to deal with pests in food and aid with preservation. A handful of patents were issued, though these had little impact outside the academic realm.

It was only in the years after World War II that things really kicked off in earnest, with the US Army in particular investing a great deal of money to investigate the potential benefits of food irradiation (also known as radurization). With the aid of modern, potent sources of radiation, studies were undertaken at laboratories at the Quartermaster Food and Container Institute, and later at the Natick R&D Command. Much early research focused on meats—specifically beef, poultry, and pork products. A technique was developed which involved cooking food, portioning it, and sealing it in vacuum packs. It would then be frozen and irradiated at a set minimum dose. This process was developed to the point that refrigeration became unnecessary in some cases, and avoided the need to use potentially harmful chemical preservatives in food. These were all highly desirable attributes which promised to improve military logistics.

youtube.com/embed/pe6AKh_tLys?…

Food irradiation eventually spread beyond research and into the mainstream.

The technology would eventually spread beyond military research. By the late 1950s, a German effort was irradiating spices at a commercial level. By 1985, the US Food and Drug Administration had approved irradiation of pork, which became a key target for radurization in order to deal with trichinosis parasites. In time, commercialized methods would be approved in a number of countries to control insects in fruits, vegetables, and bulk foods like legumes and grain, and to prevent sprouting during transport. NASA even began using irradiated foods for space missions in the 1970s, recognizing that traditional food preservation methods aren’t always practical when you’re orbiting Earth. This space-age application highlights one of irradiation’s key advantages—it works without chemicals and eliminates the need for ongoing refrigeration to avoid spoilage. That’s a huge benefit for space missions which can save a great deal of weight by not taking a fridge with them. It also helps astronauts avoid foodborne illnesses, which are incredibly impractical in the confines of a spaceship. Irradiated food has also been used in hospitals to protect immune-compromised patients from another potential source of infection.

How It’s Done

A truck-mounted food irradiator, used in a demonstration tour around the United States in the late 1960s. Credit: US Department of Energy
Three main types of radiation are used commercially to treat food. Gamma rays from cobalt-60 or cesium-137 sources penetrate deeply into food, and it’s possible to use these isotopes to produce uniform and controlled doses of radiation. Cobalt-60 is more commonly used, as it is easier to obtain and can be used with less risks. Isotope sources can’t be switched “off,” so are stored in water pools when not in use to absorb their radiation output. Electron beams, generated by linear accelerators, offer precise control of dosage, but have limited penetration depth into food, limiting their use cases to specific foods. X-rays, produced when high-energy electrons strike a metal target, combine the benefits of both gamma rays and electron beams. They have excellent penetration and can be easily controlled by switching the X-ray source on and off. The choice depends on the specific application, with factors like food density, package size, and required dose uniformity all playing roles. Whatever method is used, there’s generally no real risk of food becoming irradiated. That’s because the X-rays, electron beams, and gamma rays used for irradiation are all below the energy levels that would be required to actually impact the nucleus of the atoms in the food. Instead, they’re only strong enough to break chemical bonds. It is thus important to ensure the irradiation process does not cause harmful changes in whatever material the food is stored in; much research has gone into finding safe materials that are compatible with the irradiation process.
A chamber used for gamma ray food irradiation with cobalt-60. Credit: Swimmaaj
The dosage levels used in food irradiation are carefully calibrated and measured in units in Grays (Gy) or more typically, kiloGrays (kGy). Low doses of 0.1 to 1 kGy can inhibit sprouting in potatoes and onions or delay ripening in fruits. Medium doses of 1 to 10 kGy eliminate insects and reduce pathogenic bacteria. High doses above 10 kGy can sterilize foods for long-term storage or for space-or hospital-based use, though these doses are not as widely used for commercial food products.

By and large, irradiation does not have a major effect on a food’s taste, appearance, or texture. Studies have shown that irradiation can cause some minor changes to food’s nutritional content, as noted by the World Health Organization. However, while irradiation can highly degrade vitamins in a pure solution, in food items, losses are typically on the order of a few percent at most. The losses are often comparable to or less than those from traditional processing methods like canning or freezing. Changes to carbohydrates, proteins, and lipids are usually very limited. The US FDA, World Health Organization, and similar authorities in many countries have approved food irradiation in many contexts, with studies bearing out its overall safety.
The Radura logo is used to mark foods that have been treated with irradiation. Credit: US FDA
In some extreme cases, though, irradiation can cause problems. In 2008, Orijen cat foods were recalled in Australia after the irradiated product was found to be causing illness in cats. This was not a result of any radioactive byproduct. Instead, the issue was that the high dose (>50 kGy) of radiation used had depleted vitamin A content in the food. Since pets are often fed a very limited diet, this led to nutrient deficiencies and the unfortunate deaths of a number of animals prior to being recalled.

The regulatory landscape varies significantly worldwide, both in dose levels and in labelling. While the United States allows irradiation of various foods including spices, fruits, vegetables, grains, and meats, rules mandate that irradiated products are clearly identified. The distinctive radura symbol—a stylized flower in a circle—must appear alongside text stating “treated with radiation” or “treated by irradiation.” Some countries have embraced the technology more fully; others less so. EU countries primarily allow radiation treatments for herbs and spices only, while in Brazil, just about any food may be irradiated to whatever dose deemed necessary, though doses above 10 kGy should have a legitimate technological purpose.

Overall, food irradiation is a a scary-sounding technology that actually makes food a lot safer. It’s not something we think about on the regular, but it has become an important part of the international food supply nonetheless. Where there are pests to prevent and pathogens to quash, irradiation can prove a useful tool to preserve the quality of food and protect those that eat it.


hackaday.com/2025/08/19/food-i…



L'autoritarismo della signora della Garbatella. Alla faccia della democrazia! (Però gli autocrati rimangono Putin e alleati).

Fuorionda di Meloni contro i giornalisti, è polemica | ANSA.it
ansa.it/sito/notizie/politica/…



I chatbot di Meta e Character.AI sono un po’ troppo ambigui con i minori

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Il Texas sta indagando su Meta e Character.AI per l’uso di chatbot promossi come strumenti terapeutici, mentre il Senato Usa ha avviato un’inchiesta su Meta per presunte interazioni



Difesa aerea Ue, così le tecnologie dirompenti possono fare la differenza

@Notizie dall'Italia e dal mondo

I conflitti recenti, dall’Ucraina al Medio Oriente, hanno ampiamente dimostrato la centralità che la difesa aerea ricopre nell’odierno contesto strategico. L’avvento massiccio dei droni — specialmente quelli aerei — è andato ad aggiungere quantità e qualità a una già



The VLF Transformation


People have long been interested in very low frequency (VLF) radio signals. But it used to be you pretty much had to build your own receiver which, luckily, wasn’t as hard as building your own VHF or UHF gear. But there is a problem. These low frequencies have a very long wavelength and, thus, need very large antennas to get any reception. [Electronics Unmessed] says he has an answer.

These days, if you want to explore any part of the radio spectrum, you can probably do it easily with a software-defined radio (SDR). But the antenna is the key part that you are probably lacking. A small antenna will not work well at all. While the video covers a fairly common idea: using a loop antenna, his approach to loops is a bit different using a matching transformer, and he backs his thoughts up with modeling and practical results.

Of course, transformers also introduce loss, but — as always — everything is a trade-off. Running hundreds of feet of wire in your yard or even in a loop is not always a possibility. This antenna looks like it provides good performance and it would be simple to duplicate.

Early radio was VLF. Turns out, VLF may provide an unexpected public service in space.

youtube.com/embed/1x8rcep6mRE?…


hackaday.com/2025/08/19/the-vl…



Il Ministro Giuseppe Valditara, ha firmato il decreto che assegna nuove risorse finanziarie per l’istituzione di posti “in deroga”, per l’anno scolastico 2025/2026, a favore del personale docente e del personale amministrativo, tecnico e ausiliario n…


Chrissie Hynde & Pals presentano Duets Special in uscita a ottobre
freezonemagazine.com/news/chri…
Chrissie Hynde, torna con un progetto inaspettato e calorosamente intimo: Duets Special, pubblicato sotto l’accattivante nome Chrissie Hynde & Pals, in uscita il 17 ottobre 2025 per Parlophone (e Rhino).Questo è il quarto album solista in studio di Hynde e rappresenta una svolta decisiva verso un territorio più tenero e


A 404 Media investigation reveals how the man who started Tea, the ‘women dating safety’ app, tried to hire a female ‘face’ for the company and then hijack her grassroots community.#Features


How Tea’s Founder Convinced Millions of Women to Spill Their Secrets, Then Exposed Them to the World


On March 16, 2023, Paola Sanchez, the founder and administrator of Are We Dating the Same Guy?, a collection of Facebook groups where women share “red flags” about men, received a message from Christianne Burns, then fiancée of Tea CEO and founder Sean Cook.

“We have an app ready to go called ‘Tea - Women’s Dating Community’, that could be a perfect transition for the ‘Are we dating the same guy’ facebook groups since it sounds like those are on their way under… Tea has all the safety measures that Facebook lacked and more to ensure that only women are in the group,” Burns said. “We are looking for a face and founder of the app and because of your experience, we think YOU will be the perfect person! This can be your thing and we are happy to take a step back and let you lead all operations of the product.”

The Tea app, much like the Are We Dating the Same Guy Facebook groups, invites women to join and share red flags about men to help other women avoid them. In order to verify that every person who joined the Tea app was a woman, Tea asked users to upload a picture of their ID or their face. Tea was founded in 2022 but largely flew under the radar until July this year, when it reached the top of the Apple App Store chart, earned glowing coverage in the media, and claimed it had more than 1.6 million users.

Burns’ offer to make Sanchez the “face” of Tea wasn't the first time she had reached out to her, but Sanchez never replied to Burns, despite multiple attempts to recruit her. As it turned out, Tea did not have all the “safety measures” it needed to keep women safe. As 404 Media first reported, Tea users’ images, identifying information, and more than a million private conversations, including some about cheating partners and abortions, were compromised in two separate security breaches in late July. The first of these breaches was immediately abused by a community of misogynists on 4chan to humiliate women whose information was compromised.

A 404 Media investigation now reveals that after Tea failed to recruit Sanchez as the face of the app and adopt the Are We Dating the Same Guy community, Tea shifted tactics to raid those Facebook groups for users. Tea paid influencers to undermine Are We Dating the Same Guy and created competing Facebook groups with nearly identical names. 404 Media also identified a number of seemingly hijacked Facebook accounts that spammed the real Are We Dating The Same Guy groups with links to Tea app.

404 Media’s investigation also discovered a third security breach which exposed the personal data of women who were paid to promote the app.

“Since first creating these [Are We Dating The Same Guy] groups, I have avoided speaking to the media as much as possible because these groups require discretion and privacy in order to operate safely and best protect our members,” Sanchez told 404 Media. “However, recent events have led me to decide to share some concerning practices I’ve witnessed, including messages I received in the past that appear to contradict some of the information currently being presented as fact.”

Burns is no longer with Cook or involved with Tea, and she did not respond to multiple requests for comment. But messages from Burns to Sanchez show that Cook changed his story about why he created Tea after they broke up. 404 Media also talked to a former Tea employee who said she only knew Burns as “Tara,” a persona that also exists in the Tea app and on Facebook as an official representative of the Tea app. This employee said that when Burns left the company, Cook took over the persona and communicated with other Tea users as if he was Tara.

Overall, our reporting shows that while Cook said he built Tea to “protect women,” he repeatedly put them at risk and tried to replace a grassroots movement started by a woman who declined to help him. As one woman who worked for him at Tea told us: “his [Cook’s] motive is money, not actually to protect people.”

Tea did not directly answer a list of specific questions regarding 404 Media’s findings and the facts presented in this article. Instead, it sent us the following statement:

“Building and scaling an app to meet the demand we’ve seen is a complex process. Along the way, we’ve collaborated with many, learned a great deal and continue to improve Tea,” a Tea spokesperson said. “What we know, based on the fact that over 7 million women now use Tea, with over 100,000 new sign ups per day, is that a platform to help women navigate the challenges of online dating has been needed for far too long. As one of the top apps in the U.S. App Store, we are proud of what we’ve built, and know that our mission is more urgent than ever. We remain committed to evolving Tea to meet the needs of our growing community every day.”

How Tea Tried to Recruit a Female “Face” for the App


Sanchez started the first Are We Dating The Same Guy Facebook group in 2022 after her terrible experiences dating. The basic premise—a space for women to share information about men with other women—has existed in various forms before, but Are We Dating The Same Guy quickly became an online phenomenon. Today, Are We Dating The Same Guy is comprised of more than 200 different Facebook groups dedicated to different cities across the U.S. and Canada and has more than 7 million members. The groups have many volunteer moderators, but Sanchez is still the administrator for most of them.

Women in the groups, who can also post anonymously, share a wide range of experiences, from relatively benign complaints about men they didn’t like, to serious accusations of infidelity and physical assault.

The popularity of Are We Dating The Same Guy groups is evidence that its members find them useful, but that popularity has come with a cost. Sanchez has become increasingly cautious after several attempts at retaliation from disgruntled men who are organizing on Telegram to dox women in the group and at least one lawsuit. In that case, a man accused Are We Dating The Same Guy of libel after a user in the Chicago group called him “clingy” and a “psycho.” Sanchez also said she had a rock thrown through the window of her family’s home by a man who wanted to stop Are We Dating The Same Guy, that she pays for a service to wipe her personal information from the internet, and that she generally keeps a low profile. This is the first time she has talked to the press.

By the time she was first approached by Burns in October, 2022, Sanchez was suspicious of Tea’s interest in Are We Dating The Same Guy because of some of the negative attention the groups already got.

“I’m a huge fan of all the work you're doing and I think it will have an ENORMOUS and important benefit on the lives of women,” Burns said in a Facebook message to Sanchez on October 25, 2022. At the time, Burns’ Facebook profile picture was a photo of her and Cook smiling. “My fiance and I have been working on a similar project due to my own dating woes and thought you’d be the perfect person to collaborate with on it.”

This is an entirely different origin story than the one Cook tells about Tea today. On Linkedin, Tea’s site, and interviews, Cook says that he “launched Tea after witnessing his mother’s terrifying experience with online dating—not only being catfished but unknowingly engaging with men who had criminal records.”

Before starting Tea, Cook worked at a couple of tech companies in San Francisco, including Salesforce, where he held a “director” title and rapped and made songs about Salesforce products during presentations he shared on Linkedin.


0:00
/3:59

A video Sean Cook uploaded to Linkedin

There is no mention of Burns on the Tea site, but in 2022 she persistently asked Sanchez to join Tea.

In addition to messaging her on Patreon and Facebook, on December 2, Burns sent Sanchez $25 on Venmo along with a message thanking Sanchez for her work. “Sent you a PM on Facebook re: Business collab when you get a chance! 😊” On December 7, 2022 Burns sent Sanchez $15 on buymeacoffee.com along with a message about a “business opportunity,” and “an app with a similar concept to the facebook groups you manage that I would love to collaborate with you on!”

In April2023, after Sanchez didn’t respond to Tea’s requests, Are We Dating The Same Guy group admins started banning a set of Facebook accounts posting links to the Tea app over and over again. For example, Are We Dating The Same Guy moderators banned one Facebook user named Crystal Lee from 25 groups across the country after the account repeatedly encouraged members to use Tea and suggested that information about the men they’re asking about was available there. Lee’s account was clearly hijacked from a woman with a different name sometime around 2016. While the account name is Crystal Lee, the name in the URL for her page is Kimberly Ritchart. I found Richart’s new Facebook account, where her first post in 2016 says she lost access to her original account. 404 Media couldn’t confirm who was in control of the account, and saw no evidence that Tea was behind it, but activity from similarly hijacked accounts indicate that there was an organized effort to stealthily promote the Tea app in the Are We Dating The Same Guy groups.

Two other Facebook accounts, Norma Warner and Morgan Ward, were banned from 23 groups and five groups respectively for spamming Tea app promotions. Warner and Ward also shared identical replies two weeks apart. “If I remember correctly, I think he’s been posted to Tea. I maybe [sic] mistaking him for someone else but looks pretty familiar,” both replies said in response to different posts in different groups.

Veronica Marz told me she was hired in April 2024 to be Tea’s partnerships manager. Her job was to manage the affiliate program that would pay people $1 per user who signed up to Tea via their unique affiliate link. She also moderated a number of groups named “Are We Dating the Same Guy | Tea App” for different cities, which were started by and owned by the Tea app and could obviously confuse Facebook users. Marz also reached out to admins of the real Are We Dating The Same Guy groups to ask if they’d be willing to join the affiliate program.

While reporting this story, 404 Media discovered that Tea’s data about the affiliate program, including who signed up for it, their real name, how much they have been paid, their emails, phone numbers, Venmo accounts, and charities they wanted to donate to if they didn’t want the money, were left exposed online. All a hacker or other third party had to do to view all of this data was add “/admin” to the public Tea affiliate site’s URL. Tea turned off this site and the affiliate program entirely after 404 Media reached out for comment for this article on August 13.

On December 1, 2024, Marz noticed an account named Nicole Li who was spamming Tea app promotions in one of the Facebook groups she managed for Tea as part of her job. Li was not part of the affiliate program that Marz managed, and unbeknownst to Marz, moderators of the original Are We Dating The Same Guy groups would eventually ban the Li account later. At that point, Marz was reporting directly to Cook, and she flagged the account to him because it was suspicious and spamming several groups at the same time.

“Sean uses that account to communicate directly with users on the app, but people think they are speaking to someone actually named Tara."


“Just wanted to check and see if this person was working with the Tea app?,” Marz said in a text to Cook along with a screenshot of the account seen by 404 Media. “I’ve noticed that they’ve joined all the groups regardless of location and they’ve been promoting the app, but they aren’t a part of the affiliate program that I saw.”

Cook replied: “Not sure what’s going on there but as long as they’re not bothering anyone, I guess let’s just let them do their thing!”

All of the Facebook accounts that spammed Tea promotions were either deactivated or did not respond to our request for comment. None of the accounts were officially part of Tea’s affiliate program, according to the exposed data.

404 Media has seen several messages from Are We Dating the Same Guy Facebook group members and moderators confused about whether the Tea app was the official Are We Dating The Same Guy app, and whether Sanchez was affiliated with it. Several people also wondered if the Tara persona, which reached out to them on Facebook, was associated with Tea or if Sanchez was behind it. One review of the Tea app on the Google Play Store from January, 2024 also seemed confused and disappointed by the app.

“A girl in a FB group referred me (I think she was actually advertising 🤷),” the review said. “She called it a free app. It’s not free [...] The fb groups should have raised MORE THAN ENOUGH to cover app costs that are referred to in other reviews [...] I find this gross. Maybe I’ll come around or be back, but for now I’ll stick with fb.”

Marz also told me that several users in the Tea-owned Facebook groups were confused, and thought that they were in the original Are We Dating The Same Guy groups owned by Sanchez.

“Maybe five to seven people in different groups asked me about Paola Sanchez, and I had to explain to them, like, ‘Hey, this is not Paola’s group. This group is owned by the Tea app,’” she told me. “I had to explain to them the difference between the two.”

Tea’s promotion strategy clearly managed to poach and confuse some members of the Are We Dating The Same Guy community and get them to join the app. Later, its strategy was to undermine Are We Dating The Same Guy directly.

Today, Tea’s website credits an influencer named Daniella Szetela as helping to widely promote Tea: “One day while scrolling, Sean discovered a viral creator, Daniella, whose content resonated with millions of women—and saw an opportunity to bring that same energy to Tea. What began as a simple idea quickly turned into a social media movement.” The site says Cook was so impressed with her voice and following, he made her “Head of Socials.” A March, 2025 archive of the same page on Tea’s site tells the same story, but at the time Szetela’s title was “Chief Female Officer.”

“Together, Sean and Daniella have transformed Tea into more than an app—it’s a movement,” Tea’s site says.

In September 2024 Tea started posting videos to its official TikTok and Instagram accounts named @TheTeaPartyGirls. Some of the videos are of Szetela showing the app and talking about how great it is. Other videos are made to look like they’re coming from other Tea users, but in reality are produced by a company called SG Social Branding, which describes itself as a “Gen Z Creator Powerhouse Delivering Short Form Videos to be used for YOUR Brand’s Paid Social Ads.” According to its site, SG Social Branding has a team of “over 35 gen Z creators” who create videos for clients. These videos are made in the the style of common social media posts, like an influencer talking directly to the camera, doing man on the street interviews, or videos that look like they are clips from podcasts, but are from podcasts that don’t actually exist.

On a “case studies” page for Tea on the SG Social Branding website, the company says that Tea’s “ask” was to “Develop the narrative that Tea is the go to for Women who like to stay safe while dating.”

“We deployed creators for street interviews in locations such as NYC during daytime and the Nightlife scene on college campuses. Additionally, we made entertaining podcast clips of girl talk that is truly un-scrollable,” the case studies page says. Under “results” it says “The TEA app went #1 in the app store on July 23rd, 2025 and is now viral! Videos deployed from SGSB creators crossed over 3.4 million views with over 74k shares and rising.”

In these videos, the influencers don’t only promote Tea and talk about it as if they actually found information on it about men they know, they also repeatedly disparage Are We Dating The Same Guy Facebook groups.

“Instead of using that Facebook group Are We Dating the Same Guy, what girls are doing now because it’s so much easier is they’re downloading Tea,” a woman holding a microphone says as if she’s talking to someone off-camera. The text overlaid on the video says “Tea Party Pod.” The woman, Savannah Isabella, is an influencer who works for SG Social Branding. She goes on to talk about how one of her friends found a guy she was seeing there and all the red flags other women have posted about him. “Miss me with that. Boy bye. And it’s so much easier and faster than that Facebook group.”

View this post on Instagram


A post shared by Tea - Dating Safety App for Women (@theteapartygirls)


In another video, Isabella is at a bar, demoing the Tea app. “Girls, forget about Are We Dating The Same Guy,” she says.

Isabella and SG Social Branding did not respond to a request for comment.

Marz told me that she was hired to Tea by a woman named Tara and that initially she only communicated with Tara. Marz did a Zoom interview with Tara before she started to work for Tea and the woman identified herself as Tara over text and email. In November 2024, Marz said that Tara left the company, at which point she started reporting directly to Cook. When I showed Marz a photograph of Christianne Burns, Cook’s then fiancée, she said that was who she knew as Tara, who first interviewed her over Zoom.

After "Tara" left, Marz said Sean took over the “Tara Tea” account which was used to communicate with Tea users in the app and on Facebook.

“Sean uses that account to communicate directly with users on the app, but people think they are speaking to someone actually named Tara,” she told me. Essentially, a man is posing as a woman to an audience of women who are trying to protect themselves from, at best, deceptive men.

How Tea Deleted Posts About Men


Tori Benitez has a private consulting business for victims of domestic violence who are in Family Court for high conflict divorces or custody battles. She told me she joined the Tea app because it promoted digital safety, talking about abusers, and protecting people by letting them share information anonymously.

“I'm in the dating scene and on dating apps, and have had my own experience, so I first joined as a user, and then I saw them post that they needed help with escalation claims,” she told me. The escalation claims were complaints both from men about what women were posting about them in the app as well as complaints from other users. She thought her experience as a paralegal would be useful, and she could use more remote work, so she sent Tea her information.

“I had a Zoom call with Sean, and he wanted to know not only a little bit about my business and how I help people, but I had to tell my own personal story.” Benitez said. “I had an ex who literally threatened to kill me and told me how he was going to kill me, even after a restraining order. My story is deep and scary, and he kind of interrupted me and started crying. And I was like, ‘Oh, are you okay?’ Looking back, shouldn't I have been the one crying? It's kind of weird.”

Benitez said she took the job because she wanted to help women. During the interview and at several points while working for Tea, Benitez said that Cook wanted to make her consulting business part of Tea. Benitez said Cook floated having a tab in the Tea app that would send women to her consulting business if they needed help, or having her run workshops for users.

“I feel like his [Cook’s] motive is money, not actually to protect people, and I think that his story about his mom is a crock of shit.”


Benitez started working in April of this year but said the job wasn’t what she expected because it made no use of her experience as a paralegal. She said the work was more like customer support, and mainly had her filtering through complaints, responding to them according to a strict script she was given, and keeping a record of the responses.

If a complaint contained words like “defamation” or seemed legally threatening, she would find the post in question and the user who posted it. At times she would contact the user and ask them if the post was true and if they had any evidence to prove it. Sometimes users would respond and say the accusations were true, and the post would remain. Sometimes the users also provided supporting evidence, like court documents. Sometimes the users would delete the posts themselves, or Tea would delete the posts if the users didn’t respond to Benitez’s questions after a certain amount of time.

“That's when things would get deleted and literally no longer exist on there,” she said. “Nobody could find them. They did not go into an archive. They are just poof gone.”

She would record all the complaints and responses in a spreadsheet for Tea’s internal records, but said it didn’t always make sense when Tea decided to delete a public post on the Tea app vs when it decided to leave one up. In one interview in May, 2025, Cook said the Tea app receives “three legal threats a day from men,” and that Tea has a full legal team that helps it manage those situations.

Benitez said that in one case, Cook told her he would handle a complaint from a man regarding what was said about him on the app himself because Cook knew the man personally.

“He [Cook] seemed to side with or randomly choose to delete things that just didn't make sense and felt really concerning to me,” she said. “But I felt I had no room to complain, because every time I brought up a concern his response was either ‘ignore it,’ or ‘I will handle it,’ and there's no HR, so it's not like I can go anywhere to say all this stuff's happening. I didn't have any other point of contact other than him.”

Benitez also said she raised concerns about users’ behavior on the app. She said that at some point earlier this year Tea went viral in one town in Louisiana, where Tea users started going after each other and the number of complaints exploded.

“There was a lot of fighting in the comments between users. There were a lot of threats between users. It just turned into a chat room,” she said. “They would be fighting each other. Like, ‘Where are you at? I’ll pull up on you.’ I was like, ‘holy shit.’ There would be racist posts. It just started getting bad, and I mentioned that to him [Cook] as well, and I basically got the answer of let them say whatever they want. And like this whole like, you know, ‘It's free speech.’ I thought this was about protecting people,” Benitez recalled.

In May, Benitez said Cook was late to pay her. When she asked about it, Cook said he didn’t have the money, and asked her to keep working until he did, or work for less pay. At that point, Benitez said she wouldn’t work until she got paid for the work she already did. Eventually Cook sent her the money for the hours she already worked, but Benitez never came back.

There are currently two class action lawsuits in motion against Tea accusing the company of failing to properly secure users’ private information. After these complaints were filed Tea updated its terms of service, which now require users to waive their right to participate in class actions against the company, and agree to attempt an “informal dispute resolution” before suing the company.

“I feel like his [Cook’s] motive is money, not actually to protect people,” Benitez said, “and I think that his story about his mom is a crock of shit.”

Tea’s Security Breaches Put Users at Risk


On July 25, 404 Media broke the news that Tea made an error that completely exposed a database containing at least 72,000 thousand images from its users, and that a misogynistic 4chan community downloaded them and shared them online in various forms in order to harass and humiliate women. On July 28, 404 Media revealed an even worse security breach to Tea, which exposed more than a million private messages between Tea users that included identifying information and intimate conversations about cheating partners and abortions.

After the first hack, someone created a website modeled after “Facemash,” the site that Facebook CEO Mark Zuckerberg infamously created while he was a student at Harvard to rank the attractiveness of female students at the university. This new site, based on Tea data, took the selfies women uploaded to Tea in order to verify they are women, presented them to visitors in pairs, and allowed them to choose which they believed was more attractive. The site used the votes to create a ranking and also highlighted the list of the 50 most and least attractive women according to votes.

The second breach was far more dangerous not only because the direct messages between Tea users that were exposed included conversations they thought were private about sensitive subjects that could become dangerous in the wrong hands, but also because those conversations included details that could be used to deanonymize users. Direct messages between users often included their real phone numbers, names, and social media handles.

“I posted on the app about a man who groomed and abused me as a minor,” one Tea user whose direct messages were exposed in the second security breach told 404 Media. The user asked to be anonymous because she’s heard about “incel dudes” doxing Tea users. “I joined Tea because I appreciated the premise of a ‘whisper network’ for community safety—because a huge amount of men are, in fact, unsafe individuals, and most of the time those impacted don't find out until it's too late.”

This user added that they felt safe enough to share intimate details on Tea because it was advertised as a “safe space” for women with a strong emphasis on anonymity.

“My reaction to the breach is anger, just anger, and some disgust,” the user said.

Kasra Rahjerdi, the researcher who flagged the second security breach to 404 Media, said there were signs he wasn’t the only person who may have accessed more than a million of private Tea messages. Every Tea user is assigned a unique API key which allows them to interface with the app in order to log in, read public posts, share posts, or do other actions in the app. Rahjerdi discovered that any Tea user was also able to use their own API key to access sensitive parts of the Tea app’s backend, including a database of private messages and the ability to send all Tea users a push notification.

This access also allowed users to create new databases, and Rahjerdi told 404 Media he saw someone else doing just that while he was looking at Tea’s backend. Most of these databases were empty, but one contained a link to a Discord server with a handful of users which shut down shortly after 404 Media tried to join it on July 26. This activity indicates that someone else found the same security breach as Rahjerdi and could have accessed more than a million private messages of Tea users as well.

In a podcast interview in April, 2025, Cook said he doesn’t know how to code, and that the Tea app was built by two developers in Brazil. According to Tea’s Linkedin page, both developers are contractors who are available to hire via Toptal, a platform where software developers offer their labor as remote freelancers. Those two developers did not respond to our request for comment.

Eva Galperin, the director of cybersecurity at the Electronic Frontier Foundation, told 404 Media that the private Tea messages could be especially dangerous to Tea users who talked about abortions or specific men.

“I would be particularly concerned about posts about abortions in say Texas, where SB 8 grants a private right of action to sue anyone who performs or facilitates an abortion that violates the law,” Galperin said. SB 8, also known as the “Texas Heartbeat Act,” bans abortion after the detection of a “fetal heartbeat,” which is usually six weeks into pregnancy. The law also allows anyone to sue anyone else who performs abortions or “aids and abets” performing or inducing an abortion in violation of the law. “I’d also be concerned about DMs containing information of sexual orientation or immigration status, or details about sexual assault that the survivor was sharing in private.”

Galperin said she would be “extremely concerned” if the messages got out, not just because of the men who are named in the messages, but because “There are people who think that anyone who has an account on this platform is fair game for harassment,” referring to some of the harassment we’ve already seen from 4chan.

Despite the risks the Tea app has already put users in, Tea has downplayed the impact of the security breaches, and has continued to grow in popularity. On July 28, Tea said in a post to Instagram that “some” direct messages were accessed as part of the initial incident, and that it had temporarily disabled the ability for users to send direct messages. The statement does not acknowledge that more than a million messages were exposed, and also misleads users that those messages were leaked as part of the initial breach. The messages were exposed in an entirely separate breach around different security issues. On July 26, after 404 Media reported about both Tea breaches, Tea said on Instagram that it received over 2.5 million requests to join the app. The replies from users on Instagram are filled with people who are on the Tea app waiting list to be approved. Again, even after it said it has hired a cybersecurity firm to address the two previously reported breaches, 404 Media found a third security issue that exposed users’ private information that Tea wasn’t aware of until we reached out for comment.

Today, Tea’s site boasts that more than 6.2 million women use the app.

Joseph Cox contributed reporting.




Per porre fine alla guerra in Ucraina, devono vincere tutti. La versione di Caruso

@Notizie dall'Italia e dal mondo

L’arte della diplomazia non consiste solo nel trovare soluzioni tecniche ai conflitti, ma nel costruire narrazioni che permettano a ogni leader di tornare a casa con qualcosa da celebrare davanti ai propri elettori. Questa dinamica, spesso sottovalutata



La US Navy potrebbe selezionare l’M-346 di Leonardo per addestrare i suoi futuri piloti

@Notizie dall'Italia e dal mondo

La Marina statunitense è alla ricerca di un nuovo aereo d’addestramento per sostituire i suoi T-45 Goshawk, ormai arrivati a fine vita operativa. In corsa per questa sfida c’è il Beechcraft M-346N, versione a stelle e strisce del trainer avanzato



How to Sink a Ship: Preparing the SS United States For its Final Journey


When we last brought you word of the SS United States, the future of the storied vessel was unclear. Since 1996, the 990 foot (302 meter) ship — the largest ocean liner ever to be constructed in the United States — had been wasting away at Pier 82 in Philadelphia. While the SS United States Conservancy was formed in 2009 to support the ship financially and attempt to redevelop it into a tourist attraction, their limited funding meant little could be done to restore or even maintain it. In January of 2024, frustrated by the lack of progress, the owners of the pier took the Conservancy to court and began the process of evicting the once-great liner.
SS United States docked at Pier 82 in Philadelphia
It was hoped that a last-minute investor might appear, allowing the Conservancy to move the ship to a new home. But unfortunately, the only offer that came in wasn’t quite what fans of the vessel had in mind: Florida’s Okaloosa County offered $1 million to purchase the ship so they could sink it and turn it into the world’s largest artificial reef.

The Conservancy originally considered it a contingency offer, stating that they would only accept it if no other options to save the ship presented themselves. But by October of 2024, with time running out, they accepted Okaloosa’s offer as a more preferable fate for the United States than being scrapped.

It at least means the ship will remain intact — acting not only as an important refuge for aquatic life, but as a destination for recreational divers for decades to come. The Conservancy has also announced plans to open a museum in Okaloosa, where artifacts from the ship will be on display.

Laying a Behemoth to Rest


Sinking a ship is easy enough, it happens accidentally all the time. But intentionally sinking a ship, technically referred to as scuttling, in such a way that it sits upright on the bottom is another matter entirely. Especially for a ship the size of the SS United States, which will officially become both the largest intact ocean liner on the seafloor (beating out HMHS Britannic and her sister RMS Titanic) and the largest artificial reef in the world (taking the title from the USS Oriskany) when it eventually goes down.

The SS United States is currently in Mobile, Alabama, where it is being prepared for scuttling by Modern American Recycling Services and Coleen Marine. After a complete survey of the ship’s structural state, holes will be strategically cut throughout the hull. These will let the ship take on water in a more predictable way during the sinking, and also allow access to the inside of the hull for both sea life and divers. Internally, hatches and bulkheads will be removed for the same reason, though areas deemed too dangerous for recreational divers may be sealed off for safety.

At the same time, the ship must be thoroughly cleaned before it makes its final plunge into the waters off of Florida’s coast. Any remaining fuel or lubricants must be removed, as will any loose paint. Plastics that could break down, and anything that might contain traces of toxins such as lead or mercury, will also be stripped from the ship. In the end, the goal is to have very little left beyond the hull itself and machinery that’s too large to remove.
The forward funnel of the SS United States is removed and loaded onto a barge.
Finally, there’s the issue of depth. While the final resting place of the SS United States has yet to be determined, the depth is limited by the fact that Okaloosa wants to encourage recreational divers to visit. The upper decks of the ship must be located at a depth that’s reasonable for amateur divers to reach safely, but at the same time, the wreck can’t present a hazard to navigation for ships on the surface.

Once on the bottom, the goal is to have the upper decks of the ship at a depth of approximately 55 feet (17 m), making it accessible to even beginner divers. Unfortunately, the ship’s iconic swept-back funnels stand 65 feet (20 m) off the deck. While the tips of the funnels breaking through the surface of the water might make for a striking visual, it would of course be completely impractical.

youtube.com/embed/56zZtvcc7Qk?…

As such, the funnels and mast of the United States have just recently been removed. But thankfully, they aren’t being sent off to the scrapper. Instead, they will become key components of what the Conservancy is calling the “SS United States Museum and Visitor Experience.”

Honoring America’s Flagship


While the SS United States will welcome visitors willing to get their feet wet, not everyone who wants to explore the legacy of the ship will have to strap on a scuba tank. As part of the deal to purchase the ship, Okaloosa County has been working with the Conservancy to develop a museum dedicated to the ship and the cultural milieu in which she was developed and built.

Naturally, the museum will house many artifacts from the ship’s career. The Conservancy is already in the process of recalling many of the items in their collection which were loaned out while the ship was docked in Philadelphia. But uniquely, the building will also incorporate parts of the ship itself, including the funnels, mast, anchor, and at least one of the propellers.
Concept art for the SS United States Museum and Visitor Experience by Thinc Design.
Combined with some clever architecture by Thinc Design, the idea is for the museum’s structure to invoke the look of the ship itself. The Conservancy has released a number of concept images that depict various approaches being considered, the most striking of which essentially recreates the profile of the great liner with its bow extended out over the Florida waters.

A Bittersweet Farewell


To be sure, this is not the fate that the SS United States Conservancy had in mind when they purchased the ship. Over the years, they put forth a number of proposals that would have seen the ship either turned into a static attraction like the Queen Mary or returned to passenger service. But the funding always fell through, and with each year that passed the ship’s condition only got worse, making its potential restoration even more expensive.
Image Credit: SS United States Conservancy
It’s an unfortunate reality that many great ships have ended up being sold for scrap. Consider the RMS Olympic; despite being the last surviving ship of her class after the sinking of her sisters Titanic and Britannic, and having a long and storied career that included service as a troop ship during the First World War, she ended up having her fittings auctioned off before ultimately being torn to pieces in the late 1930s. It was an ending so unceremonious that the exact date of her final demolition has been lost to time. Meanwhile her sunken sisters, safe from the scrapper’s reach on the sea floor, continue to be studied and explored to this day.

In an ideal world, the SS United States would be afforded the same treatment as the USS New Jersey — it would be lovingly restored and live on as a museum ship for future generations to appreciate. But failing that, it would seem that spending the next century or so playing host to schools of fish and awestruck scuba divers is a more fitting end to America’s flagship than being turned into so many paperclips.


hackaday.com/2025/08/19/how-to…




Il database di PayPal, in vendita con 15,8 milioni di account: cosa c’è da sapere


Su un popolare forum dedicato alle fughe di dati è apparso un annuncio pubblicitario per la vendita di un database che presumibilmente contiene 15,8 milioni di account PayPal con indirizzi email e password in chiaro. L’autore della pubblicazione afferma che le informazioni sono recenti e sono state ottenute a maggio di quest’anno. L’azienda stessa ha negato tali affermazioni, affermando che si tratta di un incidente risalente al 2022 e che non si sono verificati nuovi attacchi informatici.

Tuttavia, l’annuncio della vendita ha suscitato interesse a causa delle dimensioni del database dichiarato, ma non è ancora possibile verificarne l’autenticità. I ricercatori di Cybernews osservano che il frammento fornito è troppo piccolo per una verifica indipendente. Inoltre, il prezzo dell’intero archivio si è rivelato sospettosamente basso per un insieme così ampio di login e password, il che potrebbe indicare una qualità discutibile del materiale.

Secondo un portavoce di PayPal, gli aggressori si riferiscono a un attacco di credential stuffing del 2022 che ha colpito 35.000 utenti. L’azienda è stata poi indagata negli Stati Uniti e all’inizio del 2025 ha accettato di pagare 2 milioni di dollari per risolvere le accuse delle autorità di regolamentazione di New York secondo cui PayPal avrebbe violato i requisiti di sicurezza informatica.

Il database pubblicato, come sostengono i venditori, contiene non solo indirizzi email e password, ma anche campi aggiuntivi, URL correlati e cosiddette varianti, che consentono di utilizzare le informazioni in attacchi automatizzati al servizio. Se alcuni record fossero davvero recenti, ciò potrebbe semplificare le campagne di Credential Stuffing contro utenti in tutto il mondo. Allo stesso tempo, l’autore del post ammette che tra le righe sono presenti numerose ripetizioni e password già compromesse.

Gli esperti non escludono che la fonte di questi dati non sia PayPal stessa, ma i dispositivi infetti dei clienti. Negli ultimi anni, sul darknet sono stati attivamente promossi degli infostealer : programmi dannosi come RedLine, Raccoon o Vidar, che raccolgono password salvate, cookie del browser, dati di compilazione automatica e persino portafogli crittografici dai sistemi infetti. Tali software creano database sotto forma di un collegamento tra un indirizzo URL, un login e una password, che coincide perfettamente con il formato del “dump” presentato. Tali insiemi di informazioni hanno già causato perdite su larga scala, comprese quelle relative a Snowflake .

PayPal sottolinea che non sono mai state registrate gravi violazioni dei sistemi aziendali e che le affermazioni degli hacker non sono supportate da fatti.

Tuttavia, si consiglia agli utenti di non trascurare la protezione: utilizzare password complesse e univoche e abilitare l’autenticazione a più fattori, che rimane una barriera fondamentale per gli intrusi anche in caso di furto di credenziali di accesso e password.

L'articolo Il database di PayPal, in vendita con 15,8 milioni di account: cosa c’è da sapere proviene da il blog della sicurezza informatica.





Qualche giorno fa ho installato l'app dell'Aeronautica Militare per il meteo.

Confrontando le previsioni con quelle di LaMMA, un consorzio per il meteo di alto dettaglio sulla Toscana, vedo delle previsioni molto diverse già a 24 ore.

Per esempio, domani l'AM dà una massima di 29 gradi e LaMMA di 33.

Possibile che due organizzazioni così importanti facciano previsioni così diverse, già a 24 ore?

#meteo #lamma #am #AeronauticaMilitare



Amnesty. Nuove prove sulla fame a Gaza: “Politica deliberata”


@Notizie dall'Italia e dal mondo
Il rapporto della Ong raccoglie diverse testimonianze sulla combinazione mortale tra fame e malattie, concludendo che non si tratta di un effetto secondario delle operazioni militari ma è il risultato atteso di piani e politiche che Israele ha ideato e attuato, negli ultimi 22 mesi



Addio a Giulia Simi, tra le prime a credere nella necessità di un’associazione radicale per la libertà di ricerca scientifica.

“Con dolore abbiamo appreso della morte di Giulia. Era la mia forza e guida nella battaglia per diffondere nelle regioni le DAT. Uno spirito deciso e forte senza fronzoli né calcoli. che mi dava forza di credere nella libertà di scelta nella vita dei cittadini. Grazie, Giulia, la vita è fatta anche di matematica. Ti ho voluto bene. Mi e ci hai incoraggiati sempre. Grazie!
Sentite condoglianze a Marcello!”
Mina Welby

Giulia Simi, fin dall’arrivo di Luca Coscioni nel mondo radicale gli si affezionò rendendosi da subito disponibile a concorrere alla fondazione dell’Associazione che ancora oggi porta il suo nome.

Iscritta fino al 2025, negli anni Giulia ha ricoperto vari incarichi tra cui quello di vice-segretaria, impegnandosi in particolare nelle iniziative dell’Associazione per la promozione della legalizzazione dell’eutanasia e la promozione del metodo scientifico (anche) in politica.

Un pensiero pieno di riconoscenza per Giulia, per quello che ha fatto per la sua e nostra associazione. Resterà nel cuore di chi l’ha conosciuta.

Filomena Gallo e Marco Cappato

L'articolo Addio a Giulia Simi proviene da Associazione Luca Coscioni.



GodRAT – New RAT targeting financial institutions



Summary


In September 2024, we detected malicious activity targeting financial (trading and brokerage) firms through the distribution of malicious .scr (screen saver) files disguised as financial documents via Skype messenger. The threat actor deployed a newly identified Remote Access Trojan (RAT) named GodRAT, which is based on the Gh0st RAT codebase. To evade detection, the attackers used steganography to embed shellcode within image files. This shellcode downloads GodRAT from a Command-and-Control (C2) server.

GodRAT supports additional plugins. Once installed, attackers utilized the FileManager plugin to explore the victim’s systems and deployed browser password stealers to extract credentials. In addition to GodRAT, they also used AsyncRAT as a secondary implant to maintain extended access.

GodRAT is very similar to the AwesomePuppet, another Gh0st RAT-based backdoor, which we reported in 2023, both in its code and distribution method. This suggests that it is probably an evolution of AwesomePuppet, which is in turn likely connected to the Winnti APT.

As of this blog’s publication, the attack remains active, with the most recent detection observed on August 12, 2025. Below is a timeline of attacks based on detections of GodRAT shellcode injector executables. In addition to malicious .scr (screen saver) files, attackers also used .pif (Program Information File) files masquerading as financial documents.

GodRAT shellcode injector executable MD5File nameDetection dateCountry/territoryDistribution
cf7100bbb5ceb587f04a1f42939e24ab2023-2024ClientList&.scr2024.09.09Hong Kongvia Skype
e723258b75fee6fbd8095f0a2ae7e53c2024-11-15_23.45.45 .scr2024.11.28Hong Kongvia Skype
d09fd377d8566b9d7a5880649a0192b42024-08-01_2024-12-31Data.scr2025.01.09United Arab Emiratesvia Skype
a6352b2c4a3e00de9e84295c8d505dad2025TopDataTransaction&.scr2025.02.28United Arab EmiratesNA
6c12ec3795b082ec8d5e294e6a5d6d012024-2025Top&Data.scr2025-03-17United Arab Emiratesvia Skype
bb23d0e061a8535f4cb8c6d724839883
  • Corporate customer transaction &volume.pif
  • corporate customer transaction &volume.zip
  • company self-media account application qualifications&.zip
2025-05-26
  • United Arab Emirates
  • Lebanon
  • Malaysia
NA
160a80a754fd14679e5a7b5fc4aed672
  • 个人信息资料&.pdf.pif
  • informasi pribadi &pelanggan global.pdf.pif
  • global customers preferential deposit steps&.pif
2025-07-17Hong KongNA
2750d4d40902d123a80d24f0d0acc4542025TopClineData&1.scr2025-08-12United Arab EmiratesNA
441b35ee7c366d4644dca741f51eb7292025TopClineData&.scr2025-08-12JordanNA

Technical details

Malware implants
Shellcode loaders


We identified the use of two types of shellcode loaders, both of which execute the shellcode by injecting it into their own process. The first embeds the shellcode bytes directly into the loader binary, and the second reads the shellcode from an image file.

A GodRAT shellcode injector file named “2024-08-01_2024-12-31Data.scr” (MD5 d09fd377d8566b9d7a5880649a0192b4) is an executable that XOR-decodes embedded shellcode using the following hardcoded key: “OSEDBIU#IUSBDGKJS@SIHUDVNSO*SKJBKSDS#SFDBNXFCB”. A new section is then created in the memory of an executable process, where the decoded shellcode is copied. Then the new section is mapped into the process memory and a thread is spawned to execute the shellcode.

Another file, “2024-11-15_23.45.45 .scr” (MD5 e723258b75fee6fbd8095f0a2ae7e53c), serves as a self-extracting executable containing several embedded files as shown in the image below.

Content of self-extracting executable
Content of self-extracting executable

Among these is “SDL2.dll” (MD5 512778f0de31fcce281d87f00affa4a8), which is a loader. The loader “SDL2.dll” is loaded by the legitimate executable Valve.exe (MD5 d6d6ddf71c2a46b4735c20ec16270ab6). Both the loader and Valve.exe are signed with an expired digital certificate. The certificate details are as follows:

  • Serial Number: 084caf4df499141d404b7199aa2c2131
  • Issuer Common Name: DigiCert SHA2 Assured ID Code Signing CA
  • Validity: Not Before: Friday, September 25, 2015 at 5:30:00 AM; Not After: Wednesday, October 3, 2018 at 5:30:00 PM
  • Subject: Valve

The loader “SDL2.dll” extracts shellcode bytes hidden within an image file “2024-11-15_23.45.45.jpg”. The image file represents some sort of financial details as shown below.

The loader allocates memory, copies the extracted shellcode bytes, and spawns a thread to execute it. We’ve also identified similar loaders that extracted shellcode from an image file named “2024-12-10_05.59.18.18.jpg”. One such loader (MD5 58f54b88f2009864db7e7a5d1610d27d) creates a registry load point entry at “HKCU\Software\Microsoft\Windows\CurrentVersion\Run\MyStartupApp” that points to the legitimate executable Valve.exe.

Shellcode functionality


The shellcode begins by searching for the string “godinfo,” which is immediately followed by configuration data that is decoded using the single-byte XOR key 0x63. The decoded configuration contains the following details: C2 IP address, port, and module command line string. The shellcode connects to the C2 server and transmits the string “GETGOD.” The C2 server responds with data representing the next (second) stage of the shellcode. This second-stage shellcode includes bootstrap code, a UPX-packed GodRAT DLL and configuration data. However, after downloading the second-stage shellcode, the first stage shellcode overwrites the configuration data in the second stage with its own configuration data. A new thread is then created to execute the second-stage shellcode. The bootstrap code injects the GodRAT DLL into memory and subsequently invokes the DLL’s entry point and its exported function “run.” The entire next-stage shellcode is passed as an argument to the “run” function.

GodRAT


The GodRAT DLL has the internal name ONLINE.dll and exports only one method: “run”. It checks the command line parameters and performs the following operations:

  1. If the number of command line arguments is one, it copies the command line from the configuration data, which was “C:\Windows\System32\curl.exe” in the analyzed sample. Then it appends the argument “-Puppet” to the command line and creates a new process with the command line “C:\Windows\System32\curl.exe -Puppet”. The parameter “-Puppet” was used in AwesomePuppet RAT in a similar way. If this fails, GodRAT tries to create a process with the hardcoded command “%systemroot%\system2\cmd.exe -Puppet”. If successful, it suspends the process, allocates memory, and writes the shellcode buffer (passed as a parameter to the exported function “run”) to the allocated memory. A thread is then created to execute the shellcode, and the current process exits. This is done to execute GodRAT inside the curl.exe or cmd.exe process.
  2. If the number of command line arguments is greater than one, it checks if the second argument is “-Puppet.” If true, it proceeds with the RAT’s functionality; otherwise, it acts as if the number of command line arguments is one, as described in the previous case.

The RAT establishes a TCP connection to the C2 server on the port from the configuration blob. It collects the following victim information: OS information, local hostname, malware process name and process ID, user account name associated with malware process, installed antivirus software and whether a capture driver is present. A capture driver is probably needed for capturing pictures, but we haven’t observed such behavior in the analyzed sample.

The collected data is zlib (deflate) compressed and then appended with a 15-byte header. Afterward, it is XOR-encoded three times per byte. The final data sent to the C2 server includes a 15-byte header followed by the compressed data blob. The header consists of the following fields: magic bytes (\x74\x78\x20) , total size (compressed data size + header size), decompressed data size, and a fixed DWORD (1 for incoming data and 2 for outgoing data). The data received from the C2 is only XOR-decoded, again three times per byte. This received data includes a 15-byte header followed by the command data. The RAT can perform the following operations based on the received command data:

  • Inject a received plugin DLL into memory and call its exported method “PluginMe”, passing the C2 hostname and port as arguments. It supports different plugins, but we only saw deployment of the FileManager plugin
  • Close the socket and terminate the RAT process
  • Download a file from a provided URL and launch it using the CreateProcessA API, using the default desktop (WinSta0\Default)
  • Open a given URL using the shell command for opening Internet Explorer (e.g. “C:\Program Files\Internet Explorer\iexplore.exe” %1)
  • Same as above but specify the default desktop (WinSta0\Default)
  • Create the file “%AppData%\config.ini”, create a section named “config” inside this file, and, create in that section a key called “NoteName” with the string provided from the C2 as its value


GodRAT FileManager plugin


The FileManager plugin DLL has the internal name FILE.dll and exports a single method called PluginMe. This plugin gathers the following victim information: details about logical drives (including drive letter, drive type, total bytes, available free bytes, file system name, and volume name), the desktop path of the currently logged-on user, and whether the user is operating under the SYSTEM account. The plugin can perform the following operations based on the commands it receives:

  • List files and folders at a specified location, collecting details like type (file or folder), name, size, and last write time
  • Write data to an existing file at a specified offset
  • Read data from a file at a specified offset
  • Delete a file at a specified path
  • Recursively delete files at a specified path
  • Check for the existence of a specified file. If the file exists, send its size; otherwise, create a file for writing.
  • Create a directory at a specified path
  • Move an existing file or directory, including its children
  • Open a specified application with its window visible using the ShellExecuteA API
  • Open a specified application with its window hidden using the ShellExecuteA API
  • Execute a specified command line with a hidden window using cmd.exe
  • Search for files at a specified location, collecting absolute file paths, sizes, and last write times
  • Stop a file search operation
  • Execute 7zip by writing hard-coded 7zip executable bytes to “%AppData%\7z.exe” (MD5 eb8d53f9276d67afafb393a5b16e7c61) and “%AppData%\7z.dll” (MD5 e055aa2b77890647bdf5878b534fba2c), and then runs “%AppData%\7z.exe” with parameters provided by the C2. The utility is used to unzip dropped files.


Second-stage payload


The attackers deployed the following second-stage implants using GodRAT’s FileManager plugin:

Chrome password stealer


The stealer is placed at “%ALLUSERSPROFILE%\google\chrome.exe” (MD5 31385291c01bb25d635d098f91708905). It looks for Chrome database files with login data for accessed websites, including URLs and usernames used for authentication, as well as user passwords. The collected data is saved in the file “google.txt” within the module’s directory. The stealer searches for the following files:

  • %LOCALAPPDATA%\Google\Chrome\User Data\Default\Login Data – an SQLite database with login and stats tables. This can be used to extract URLs and usernames used for authentication. Passwords are encrypted and not visible.
  • %LOCALAPPDATA%\Google\Chrome\User Data\Local State – a file that contains the encryption key needed to decrypt stored passwords.


MSEdge password stealer


The stealer is placed at “%ALLUSERSPROFILE%\google\msedge.exe” (MD5 cdd5c08b43238c47087a5d914d61c943). The collected data is stored in the file “edge.txt” in the module’s directory. The module attempts to extract passwords using the following database and file:

  • %LOCALAPPDATA%\Microsoft\Edge\User Data\Default\Login Data – the “Login Data” SQLite database stores Edge logins in the “logins” table.
  • %LOCALAPPDATA%\Microsoft\Edge\User Data\Local State – this file contains the encryption key used to decrypt saved passwords.


AsyncRAT


The DLL file (MD5 605f25606bb925d61ccc47f0150db674) is an injector and is placed at “%LOCALAPPDATA%\bugreport\LoggerCollector.dll” or “%ALLUSERSPROFILE%\bugreport\LoggerCollector.dll”. It verifies that the module name matches “bugreport_.exe”. The loader then XOR-decodes embedded shellcode using the key “EG9RUOFIBVODSLFJBXLSVWKJENQWBIVUKDSZADVXBWEADSXZCXBVADZXVZXZXCBWES”. After decoding, it subtracts the second key “IUDSY86BVUIQNOEWSUFHGV87QCI3WEVBRSFUKIHVJQW7E8RBUYCBQO3WEIQWEXCSSA” from each shellcode byte.

A new memory section is created, the XOR-decoded shellcode is copied into it, and then the section is mapped into the current process memory. A thread is started to execute the code in this section. The shellcode is used to reflectively inject the C# AsyncRAT binary. Before injection, it patches the AMSI scanning functions (AmsiScanBuffer, AmsiScanString) and the EtwEventWrite function to bypass security checks.
AsyncRAT includes an embedded certificate with the following properties:

  • Serial Number: df:2d:51:bf:e8:ec:0c:dc:d9:9a:3e:e8:57:1b:d9
  • Issuer: CN = marke
  • Validity: Not Before: Sep 4 18:59:09 2024 GMT; Not After: Dec 31 23:59:59 9999 GMT
  • Subject: CN = marke


GodRAT client source and builder


We discovered the source code for the GodRAT client on a popular online malware scanner. It had been uploaded in July 2024. The file is named “GodRAT V3.5_______dll.rar” (MD5 04bf56c6491c5a455efea7dbf94145f1). This archive also includes the GodRAT builder (MD5 5f7087039cb42090003cc9dbb493215e), which allows users to generate either an executable file or a DLL. If an executable is chosen, users can pick a legitimate executable name from a list (svchost.exe, cmd.exe, cscript.exe, curl.exe, wscript.exe, QQMusic.exe and QQScLauncher.exe) to inject the code into. When saving the final payload, the user can choose the file type (.exe, .com, .bat, .scr and .pif). The source code is based on Gh0st RAT, as indicated by the fact that the auto-generated UID in “GodRAT.h” file matches that of “gh0st.h”, which suggests that GodRAT was originally just a renamed version of Gh0st RAT.

GodRAT.h
GodRAT.h

gh0st.h
gh0st.h

Conclusions


The rare command line parameter “puppet,” along with code similarities to Gh0st RAT and shared artifacts such as the fingerprint header, indicate that GodRAT shares a common origin with AwesomePuppet RAT, which we described in a private report in 2023. This RAT is also based on the Gh0st RAT source code and is likely connected with Winnty APT activities. Based on these findings, we are highly confident that GodRAT is an evolution of AwesomePuppet. There are some differences, however. For example, the C2 packet of GodRAT uses the “direction” field, which was not utilized in AwesomePuppet.

Old implant codebases, such as Gh0st RAT, which are nearly two decades old, continue to be used today. These are often customized and rebuilt to target a wide range of victims. These old implants are known to have been used by various threat actors for a long time, and the GodRAT discovery demonstrates that legacy codebases like Gh0st RAT can still maintain a long lifespan in the cybersecurity landscape.

Indicator of Compromise

File hashes


cf7100bbb5ceb587f04a1f42939e24ab
d09fd377d8566b9d7a5880649a0192b4 GodRAT Shellcode Injector
e723258b75fee6fbd8095f0a2ae7e53c GodRAT Self Extracting Executable
a6352b2c4a3e00de9e84295c8d505dad
6c12ec3795b082ec8d5e294e6a5d6d01
bb23d0e061a8535f4cb8c6d724839883
160a80a754fd14679e5a7b5fc4aed672
2750d4d40902d123a80d24f0d0acc454
441b35ee7c366d4644dca741f51eb729
318f5bf9894ac424fd4faf4ba857155e GodRAT Shellcode Injector
512778f0de31fcce281d87f00affa4a8 GodRAT Shellcode Injector
6cad01ca86e8cd5339ff1e8fff4c8558 GodRAT Shellcode Injector
58f54b88f2009864db7e7a5d1610d27d GodRAT Shellcode Injector
64dfcdd8f511f4c71d19f5a58139f2c0 GodRAT FileManager Plugin(n)
8008375eec7550d6d8e0eaf24389cf81 GodRAT
04bf56c6491c5a455efea7dbf94145f1 GodRAT source code
5f7087039cb42090003cc9dbb493215e GodRAT Builder
31385291c01bb25d635d098f91708905 Chrome Password Stealer
cdd5c08b43238c47087a5d914d61c943 MSEdge Password Stealer
605f25606bb925d61ccc47f0150db674 Async RAT Injector (n)
961188d6903866496c954f03ecff2a72 Async RAT Injector
4ecd2cf02bdf19cdbc5507e85a32c657 Async RAT
17e71cd415272a6469386f95366d3b64 Async RAT

File paths


C:\users\[username]\downloads\2023-2024clientlist&.scr
C:\users\[username]\downloads\2024-11-15_23.45.45 .scr
C:\Users\[username]\Downloads\2024-08-01_2024-12-31Data.scr
C:\Users\[username]\\Downloads\2025TopDataTransaction&.scr
C:\Users\[username]\Downloads\2024-2025Top&Data.scr
C:\Users\[username]\Downloads\2025TopClineData&1.scr
C:\Users\[username]\Downloads\Corporate customer transaction &volume.pif
C:\telegram desktop\Company self-media account application qualifications&.zip
C:\Users\[username]\Downloads\个人信息资料&.pdf.pif
%ALLUSERSPROFILE%\bugreport\360Safe2.exe
%ALLUSERSPROFILE%\google\chrome.exe
%ALLUSERSPROFILE%\google\msedge.exe
%LOCALAPPDATA%\valve\valve\SDL2.dll
%LOCALAPPDATA%\bugreport\LoggerCollector.dll
%ALLUSERSPROFILE%\bugreport\LoggerCollector.dll
%LOCALAPPDATA%\bugreport\bugreport_.exe

Domains and IPs


103[.]237[.]92[.]191 GodRAT C2
118[.]99[.]3[.]33 GodRAT С2
118[.]107[.]46[.]174 GodRAT C2
154[.]91[.]183[.]174 GodRAT C2
wuwu6[.]cfd AsyncRAT C2
156[.]241[.]134[.]49 AsyncRAT C2
https://holoohg.oss-cn-hongkong.aliyuncs[.]com/HG.txt AsyncRAT URL
47[.]238[.]124[.]68 AsyncRAT C2


securelist.com/godrat/117119/



Volkswagen Joins the Car-As-A-Service Movement With Its ID.3 BEV


More and more car manufacturers these days are becoming interested in the recurring revenue model, with Volkswagen’s ID.3 BEV being the latest to have an optional ‘motor power upgrade’ that you can pay for either monthly or with a ‘lifetime’ payment.

As the BBC reports, this option is now available in the UK, with customers offered the option to pay £16.50 per month or £165 annually, or opt to shell out £649 for what is reportedly a ‘car lifetime’ subscription.

It appears that this subscription service has been in the works for a while already, with it being offered first last year in countries like Denmark, following which it appears to be rolled out in other countries too. The software unlock changes the maximum motor output from 150 kW to 170 kW, which some users report as being noticeable.

Regardless of whether you find this to be a good deal, the concept of Car-As-A-Service (CAAS) has becoming increasingly prevalent, with the BBC article referencing BMW’s heated seats subscription and Mercedes’ acceleration subscription. Considering that all the hardware is already in the car that you purportedly purchased, this is sure to rub people the wrong way, not to mention that from a car tuning perspective this seems to suggest that third-party tuners don’t need to apply.

Thanks to [Robert Piston] for the tip.


hackaday.com/2025/08/19/volksw…

in reply to Cybersecurity & cyberwarfare

per per dare "potenza addizionale in abbonamento" il produttore **di fatto** controlla da remoto la tua auto. Che quindi non è più tua perché non la controlli più. È lo stesso motivo per il quale rifuggo il #softwareProprietario.
Questa voce è stata modificata (2 settimane fa)
in reply to Paolo Redaelli

@Paolo Redaelli capisco cosa vuoi dire, ma ti invito a riflettere che nessuna macchina è davvero tua. Nel momento in cui hai bisogno di un pezzo di ricambio Infatti devi per forza ricorrere a rivenditori autorizzati presso i quali paghi un prezzo che è costituito soprattutto dal ribaltamento delle licenze che il produttore concede al rivenditore, oppure i cosiddetti compatibili per i quali Comunque sia paghi un prezzo che dipende sempre dalle politiche del produttore. Il possesso di una automobile già ora è pura illusione


Questa mattina Papa Leone XIV si è recato in visita privata al Santuario della Madonna delle Grazie alla Mentorella, nella frazione di Guadagnolo di Capranica Prenestina, in diocesi di Palestrina. Lo comunica la Prefettura della Casa pontificia.


Giorgia Meloni alza gli occhi al cielo mentre parla il cancelliere tedesco Merz | VIDEO


@Politica interna, europea e internazionale
Stanno facendo il giro del web le espressioni facciali che la premier Giorgia Meloni ha assunto durante il vertice alla Casa Bianca per la pace in Ucraina, in particolar modo mentre parlava il cancelliere tedesco Fridriech Merz. “Aiuteremo Kiev, ma il cessate il




ho fatto a gemina la seguente domanda:
"è possibile che chi vede nel "riscaldamento globale" anche un effetto utile a causa della recente "apertura" delle rotte artiche, sia presto trombato dai problemi dell'AMOC che possono provocare un raffreddamento dell'europa nord?"

la risposta:
"Sì, la sua osservazione è pertinente e tocca un punto cruciale del dibattito sul cambiamento climatico. Chi vede un vantaggio nell'apertura delle rotte artiche, reso possibile dal riscaldamento globale, potrebbe presto trovarsi a fare i conti con gli impatti negativi di un potenziale indebolimento o collasso della Corrente Meridionale di Ribaltamento Atlantica (AMOC), un sistema di correnti oceaniche di cui fa parte anche la Corrente del Golfo."

in sostanza un'altra trombata per putin.

in reply to simona

beh... non ti è venuto il dubbio che senza la corrente del golfo, visto che napoli è alla stessa latitudine di new york, l'europa sarebbe come il canada? puoi non fidarti di una ai ma il dato rimane quello... chiedi a chi ti pare... ma non a salvini o trump o la meloni. quanto odio i negazionisti.


Clicchi sui link degli SMS? Ecco 4,2 milioni di motivi per non farlo


Proofpoint ha pubblicato il secondo volume del suo studio annuale “Human Factor 2025” , incentrato sul phishing e sugli attacchi basati su URL. L’analisi dei dati da maggio 2024 a maggio 2025 mostra che gli aggressori utilizzano sempre più spesso il social engineering in combinazione con i link, che sono diventati il principale vettore per attaccare gli utenti.

Secondo le statistiche, i link sono stati riscontrati quattro volte più spesso degli allegati con contenuti dannosi. Oltre il 55% degli SMS con tracce di phishing conteneva un URL e il numero di campagne con la tecnica ClickFix è aumentato di quasi il 400% in un anno. In totale, i ricercatori hanno registrato 3,7 miliardi di tentativi di furto di credenziali tramite link dannosi, contro gli 8,3 milioni di tentativi di distribuzione di malware, il che conferma che l’obiettivo principale degli aggressori oggi è compromettere gli account.

Particolarmente preoccupante è il crescente numero di attacchi che utilizzano servizi legittimi. Gli aggressori mascherano URL dannosi come documenti su OneDrive o Google Drive e creano anche pagine di autorizzazione false, indistinguibili da quelle reali. L’uso diffuso di modelli di intelligenza artificiale generativa consente loro di perfezionare all’infinito i modelli di email di phishing, aumentandone la persuasività.

Tra gli strumenti principali ci sono kit di phishing già pronti all’uso come CoGUI e Darcula. Il primo è attivamente utilizzato da gruppi di lingua cinese e si rivolge principalmente agli utenti in Giappone, il secondo viene utilizzato negli attacchi SMS , spesso spacciandosi per messaggi provenienti da agenzie governative o aziende postali. Entrambi gli strumenti possono aggirare la protezione e persino intercettare i codici MFA.

Una delle tendenze più evidenti è stata la diffusione del programma ClickFix . Alla vittima viene mostrata una falsa finestra di errore o un CAPTCHA, che la invita a eseguire manualmente i comandi. Questo installa RAT , infostealer e downloader sul dispositivo. Le campagne ClickFix sono diventate una pratica comune, utilizzata sia da gruppi motivati finanziariamente che da attori statali.

Separatamente, gli esperti notano la crescita degli attacchi ai dispositivi mobili. Secondo il rapporto, nel 2024, il numero di minacce URL negli SMS è aumentato del 2534%. Nel 2025, almeno il 55% degli SMS di phishing conteneva link e il 75% delle organizzazioni ha confermato di aver subito tali attacchi. I principali attacchi sono le frodi con “multe stradali” e false notifiche di consegna.

Anche gli attacchi di phishing tramite QR code stanno guadagnando terreno. Solo nei primi sei mesi del 2025, Proofpoint ha identificato quasi 4,2 milioni di casi di abuso di codici QR. Questo vettore è comodo per i criminali, poiché consente loro di aggirare il filtro del gateway di posta: la vittima scansiona il codice su uno smartphone e finisce su un sito falso per rubare password o dati di carte di credito.

Il rapporto conclude che gli attacchi più distruttivi oggi non sono rivolti ai sistemi, ma alle persone. Tali campagne non possono avere successo senza un clic da parte dell’utente, il che significa che la principale linea di difesa è proteggere tutti i canali di comunicazione: dalle email aziendali alla messaggistica istantanea e ai servizi SaaS. Proofpoint consiglia soluzioni di intelligenza artificiale multilivello in grado di rilevare anche i più piccoli segnali di phishing in qualsiasi flusso digitale.

L'articolo Clicchi sui link degli SMS? Ecco 4,2 milioni di motivi per non farlo proviene da il blog della sicurezza informatica.





Vogliamo i colonnelli
freezonemagazine.com/rubriche/…
Era quasi inevitabile, dopo l’episodio su Una vita difficile di Dino Risi, improntare la puntata successiva di Celluloide, su un lavoro del regista “gemello” di Risi, cioè Mario Monicelli; Risi e Monicelli, sono stati, senza ombra di dubbio, non solo due grandi registi, ma per giudizio unanime, i due maggiori autori della cosiddetta commedia all’italiana […]
L'articolo Vogliamo i colonnelli provie
Era quasi


ə-Li 🐝💨💨🍯 reshared this.



molto molto molto interessante


Il fuori onda di Giorgia Meloni con Donald Trump: “Io non voglio mai parlare con la stampa italiana” | VIDEO


@Politica interna, europea e internazionale
Meloni è allergica alla stampa italiana: lo conferma lei stessa in un’imbarazzante fuori onda con Donald Trump andato in scena durante il vertice alla Casa Bianca per la pace in Ucraina. Tutto ha inizio quando il presidente finlandese Stubb, rivolgendosi allo



The Pursuit


classic.riffusion.com/song/b4e…