Salta al contenuto principale





Build Your Own 6K Camera


[Curious Scientist] has been working with some image sensors. The latest project around it is a 6K camera. Of course, the sensor gives you a lot of it, but it also requires some off-the-shelf parts and, of course, some 3D printed components.

An off-the-shelf part of a case provides a reliable C mount. There’s also an IR filter in a 3D-printed bracket.

The processor gets hot, so he used different heat sinks and a fan, too. Overall, this isn’t much custom electronics, but this is an excellent example of assembling existing parts with high-quality 3D printed components.

Heat-set inserts provide a tripon mount. There’s also a custom HDMI monitor mount if you don’t want to use your phone as a viewfinder. One neat oddity that helps is a USB-A cable that splits into three USB-C connectors. Of course, only one of them has data lines. The other two feed power to different parts of the camera.

A good-looking build. At a glance, you could easily think this was a commercial product. We do like these digital camera builds, but we also find 3D printed film cameras fascinating. If 6K is too much for you, you can always downsize.

youtube.com/embed/idA1_AyZoek?…


hackaday.com/2025/09/23/build-…



“Disarmarsi significa semplicemente amare e non possedere, liberarsi dal seme dell’odio e della vendetta, che rende arido il cuore e finisce per giustificare la violenza, fosse pure solo nelle parole, nella freddezza, nell’imbarazzo, nel pregiudizio”…


Calculator Battery Mod Lets You Go the Distance


Disposable batteries seem so 1990s. Sure, it’s nice to be able to spend a couple of bucks at the drugstore and get a flashlight or TV remote back in the game, but when the device is a daily driver, rechargeable batteries sure seem to make more financial sense. Unfortunately, what makes sense to the end user doesn’t always make sense to manufacturers, so rolling your own rechargeable calculator battery pack might be your best option.

This slick hack comes to us from [Magmabow], who uses a Casio FXCG50 calculator, a known battery hog. With regular use, it goes through a set of four alkaline AA batteries every couple of months, which adds up quickly. In search of a visually clean build, [Magmabow] based the build around the biggest LiPo pillow-pack he could find that would fit inside the empty battery compartment, and planned to tap into the calculator’s existing USB port for charging. A custom PCB provides charging control and boosts the nominal 3.7-volt output of the battery to the 5-ish volts the calculator wants to see. The PCB design is quite clever; it spans across the battery compartment, with its output feeding directly into the spring contacts normally used for the AAs. A 3D-printed insert keeps the LiPo and the PCB in place inside the battery compartment.

Almost no modifications to the calculator are needed, other than a couple of bodge wires to connect the battery pack to the calculator’s USB port. The downside is that the calculator’s battery status indicator won’t work anymore since the controller will just shut the 5-volt output down when the LiPo is discharged. It seems like there might be a simple fix for that, but implementing it on such a small PCB could be quite a challenge, in which case a calculator with a little more room to work with might be nice.

youtube.com/embed/S9CCIyYRlEc?…


hackaday.com/2025/09/23/calcul…




“Noi, Chiese in Italia, Slovenia e Croazia, ci impegniamo a essere ‘case della pace’ e a promuovere – nei nostri territori, con i giovani, le famiglie, le scuole – proposte di educazione alla nonviolenza, iniziative di accoglienza che aiutino a trasf…


Automatic Feeder Keeps Fish Sated


[Noisy Electrons] is a maker who also likes to keep fish. He sometimes needs to travel and keep his fish fed in the meantime, so he created an automated solution to handle that for him.

The build is based around an STM32 microcontroller, paired with a MCP7940N real-time clock to keep time. The microcontroller is hooked up to a few buttons and a small display to serve as an interface, allowing the feeding times and dosage amounts to be configured right on the device. Food is distributed from a 3D printed drum with a hole in it, which is rotated via a stepper motor. Each time the drum rotates, some food falls through the hole and into the tank. Dosage amount is measured in rotations — the more times the drum rotates, the more food is delivered to the fish.

[Noisy Electron] built three of these devices for three separate tanks. Thus far, it’s been three weeks and all the fish are still alive, so we’ll take that as a vote of confidence in the build. We’ve featured some other great pet feeders over the years, too

youtube.com/embed/mMoiuHav7VQ?…


hackaday.com/2025/09/23/automa…




“A 80 anni dalla fine della Seconda guerra mondiale, in un tempo sempre più dilaniato da conflitti violenti, noi, Chiese in Italia, Slovenia e Croazia, leviamo insieme, con forza, il nostro grido di pace e il nostro appello, perché ogni comunità cris…


2025 Hackaday Superconference: Announcing our Workshops and Tickets


Can you feel the nip of fall in the air? That can only mean one thing: Supercon is just around the corner. The next few weeks are going to bring a blitz of Supercon-related reveals, and we’re starting off with a big one: the workshops.

Supercon is the Ultimate Hardware Conference, and you need to be there to attend a workshop. Both workshop and general admission tickets are on sale now! Don’t wait — they sell out fast.

Kody Kinzie
Meshtastic for Beginners: Solder Your Own Cat-Themed LoRa Weather Station!

If you’ve wanted to create off-grid, encrypted mesh networks that can span over a hundred miles, this class will serve as a beginner’s guide to Meshtastic. We’ll be soldering and setting up our own custom cat-themed Meshtastic weather station nodes!

Seth Hillbrand
Level Up Your Board Game with KiCad

This workshop will teach you how to use KiCad with other common open-source tools, including Inkscape and FreeCAD, to level up your board game. We’ll make a beautiful PCB-based board game. You’ll learn techniques for better circuit layout, art transfer, case fitting, and 3D modeling.

Pat Deegan
Tiny Tapeout

In this workshop, participants will get the opportunity to design and manufacture their own design on an ASIC! Participants will learn the basics of digital logic, the basics of how semiconductors are designed and made, how to use an online digital design tool to build and simulate a simple design, and how to create the GDS files for manufacture on the open-source Sky130 PDK. Participants will have the option to submit their designs for manufacturing on the next shuttle as part of the Tiny Tapeout project.

Estefannie and Bob Hickman
Bling It On: Programming Your Own Generative Art Matrix

In this intermediate-level maker workshop, you will learn the fundamentals of generative algorithms and apply them using either Circuit Python or C++ to create a dynamic display that can pull data over WiFi from one or more APIs and use the data to visualize some generative art. The results will be beautiful and practical, and attendees will leave with an amazing 130 mm x 130 mm LED matrix.

Shawn Hymel
Introduction to Embedded Rust

Rust curious? This hands-on workshop will introduce you to this fascinating (relatively) new language and how you can use it to develop firmware for your various microcontroller projects. We’ll cover the basics of Rust’s ownership model, blink an LED (as you do), and read from an I2C sensor. (Shawn’s workshop is sponsored by DigiKey.)

November is just around the corner. Get your tickets now and we’ll see you at Supercon!


hackaday.com/2025/09/23/2025-h…



“Siete la forza spirituale della Chiesa, che attraverso di voi ci invita ora alla veglia di preghiera per la pace. Dio ascolterà la nostra supplica grazie a voi”. Le prime parole del saluto del vescovo di Capodistria, mons.


Hacking RAN: i servizi segreti USA scoprono una rete cellulare clandestina a New York


I servizi segreti statunitensi hanno riferito di aver scoperto e sequestrato una rete di apparecchiature di telecomunicazione nell’area di New York in grado di interrompere il servizio di telefonia mobile.

I dispositivi si trovavano nei pressi dell’Assemblea Generale delle Nazioni Unite, alla quale questa settimana hanno partecipato decine di leader mondiali.

Secondo l’agenzia, la rete comprendeva oltre 100.000 schede SIM e circa 300 server. Le apparecchiature consentivano l’invio di messaggi anonimi crittografati e potevano interferire con i servizi di emergenza.

Secondo un funzionario, il sistema era in grado di inviare fino a 30 milioni di messaggi di testo al minuto e i Servizi Segreti non avevano mai assistito a un’operazione di tale portata prima.

Considerati i tempi, il luogo e il potenziale di notevoli disagi alle reti di telecomunicazioni di New York City che questi dispositivi avrebbero potuto causare, l’agenzia è intervenuta rapidamente per chiudere la rete“, ha affermato il Secret Service in una nota.

L’attrezzatura è stata scoperta ad agosto in diversi siti entro un raggio di 56 chilometri dalla sede centrale delle Nazioni Unite.

La scoperta è avvenuta a seguito di un’indagine durata mesi, iniziata dopo che tre alti funzionari statunitensi avevano ricevuto “minacce telefoniche” anonime in primavera. Tra loro c’erano un agente dei Servizi Segreti e due funzionari della Casa Bianca.

Un’analisi iniziale dei dati di alcune schede SIM ha rivelato collegamenti con almeno un governo straniero, nonché con criminali già noti alle forze dell’ordine statunitensi, inclusi membri di un cartello.

Continueremo a indagare su chi si cela dietro questa rete e quali fossero i suoi obiettivi, inclusa la potenziale interruzione delle comunicazioni governative e di emergenza durante la visita dei leader mondiali a New York“, ha dichiarato Matt McCool, capo dell’ufficio newyorkese dei Servizi Segreti.

Le fotografie pubblicate mostrano rack di server pieni di schede SIM e antenne. Secondo McCool, questa rete avrebbe potuto disabilitare le torri cellulari e “paralizzare di fatto le reti mobili”.

Gli esperti hanno definito l’operazione costosa e tecnologicamente avanzata. Secondo Anthony Ferrante, responsabile della sicurezza informatica presso la società di consulenza FTI ed ex funzionario della Casa Bianca e dell’FBI, la rete scoperta era probabilmente un’operazione di spionaggio. Ha aggiunto che tali apparecchiature potrebbero essere utilizzate anche per intercettare le comunicazioni.

L’operazione ha coinvolto anche il Dipartimento di Giustizia degli Stati Uniti, il Dipartimento di Polizia di New York, l’Office of National Intelligence e l’Homeland Security Investigations. Secondo McCool, l’indagine è in corso e “non c’è motivo di credere che dispositivi simili non vengano trovati in altre città”.

Durante la perquisizione, oltre ai server SIM, gli agenti hanno scoperto anche sostanze proibite, armi illegali, computer e telefoni cellulari.

L'articolo Hacking RAN: i servizi segreti USA scoprono una rete cellulare clandestina a New York proviene da il blog della sicurezza informatica.




24 MILA FIRME CONTRO I POTERI SPECIALI DI GUALTIERI


Lo striscione che campeggia davanti a Montecitorio è il risultato di una mobilitazione straordinaria.
A sostenerlo con noi i deputati Francesco Emilio Borrelli, Andrea Volpi e Filiberto Zaratti e la Consigliera regionale Alessandra Zeppieri. La prima giornata di presidio si è quindi conclusa così.
Domani proseguiamo per arrivare a una consegna della petizione e di tutte le firme a suo sostegno che si traduca in un impegno che onori, come merita, ognuna di quelle firme.

L'Unione dei Comitati contro l'inceneritore




quale è il corriere che non passa neppure da casa tua, ma segna che è passato e che nessuno ha aperto? GLS. le statistiche GLS: su 10 consegne, per quante non trovi il destinatario? 7. le statistiche SDA: su 10 consegne, per quante non trovi il destinatario? 1.


Il fantasma dello stato di #Palestina


altrenotizie.org/primo-piano/1…



Non c'è giorno dove non si legga una minchiata da parte degli eurovermi e/o Nato. Ed eccola anche oggi. Jet e droni russi a gogò ormai per i cieli del mondo...


AI slop is taking over workplaces. Workers said that they thought of their colleagues who filed low-quality AI work as "less creative, capable, and reliable than they did before receiving the output."#AISlop #AI


AI ‘Workslop’ Is Killing Productivity and Making Workers Miserable


A joint study by Stanford University researchers and a workplace performance consulting firm published in the Harvard Business Review details the plight of workers who have to fix their colleagues’ AI-generated “workslop,” which they describe as work content that “masquerades as good work, but lacks the substance to meaningfully advance a given task.” The research, based on a survey of 1,150 workers, is the latest analysis to suggest that the injection of AI tools into the workplace has not resulted in some magic productivity boom and instead has just increased the amount of time that workers say they spend fixing low-quality AI-generated “work.”

The Harvard Business Review study came out the day after a Financial Times analysis of hundreds of earnings reports and shareholder meeting transcripts filed by S&P 500 companies that found huge firms are having trouble articulating the specific benefits of widespread AI adoption but have had no trouble explaining the risks and downsides the technology has posed to their businesses: “The biggest US-listed companies keep talking about artificial intelligence. But other than the ‘fear of missing out,’ few appear to be able to describe how the technology is changing their businesses for the better,” the Financial Times found. “Most of the anticipated benefits, such as increased productivity, were vaguely stated and harder to categorize than the risks.”

Other recent surveys and studies also paint a grim picture of AI in the workplace. The main story seems to be that there is widespread adoption of AI, but that it’s not proving to be that useful, has not resulted in widespread productivity gains, and often ends up creating messes that human beings have to clean up. Human workers see their colleagues who use AI as less competent, according to another study published in Harvard Business Review last month. A July MIT report found that “Despite $30–40 billion in enterprise investment into GenAI, this report uncovers a surprising result in that 95% of organizations are getting zero return … Despite high-profile investment, industry-level transformation remains limited.” A June Gallup poll found that AI use among workers doubled over the last two years, and that 40 percent of those polled have used AI at work in some capacity. But the poll found that “many employees are using AI at work without guardrails or guidance,” and that “The benefits of using AI in the workplace are not always obvious. According to employees, the most common AI adoption challenge is ‘unclear use case or value proposition.’”

These studies, anecdotes we have heard from workers, and the rise of industries like “vibe coding cleanup specialists” all suggest that workers are using AI, but that they may not be leading to actual productivity gains for companies. The Harvard Business Review study proposes a possible reason for this phenomenon: Workslop.

The authors of that study, who come from Stanford University and the workplace productivity consulting firm BetterUp, suggest that a growing number of workers are using AI tools to make presentations, reports, write emails, and do other work tasks that they then file to their colleagues or bosses; this work often appears useful but is not: “Workslop uniquely uses machines to offload cognitive work to another human being. When coworkers receive workslop, they are often required to take on the burden of decoding the content, inferring missed or false context. A cascade of effortful and complex decision-making processes may follow, including rework and uncomfortable exchanges with colleagues,” they write.

The researchers say that surveyed workers told them that they are now spending their time trying to figure out if any specific piece of work was created using AI tools, to identify possible hallucinations in the work, and then to manage the employee who turned in workslop. Surveyed workers reported spending time actually fixing the work, but the researchers found that “the most alarming cost may have been interpersonal.”

“Low effort, unhelpful AI generated work is having a significant impact on collaboration at work,” they wrote. “Approximately half of the people we surveyed viewed colleagues who sent workslop as less creative, capable, and reliable than they did before receiving the output. Forty-two percent saw them as less trustworthy, and 37% saw that colleague as less intelligent.”

No single study on AI in the workplace is going to be definitive, but evidence is mounting that AI is affecting people’s work in the same way it’s affecting everything else: It is making it easier to output low-quality slop that other people then have to wade through. Meanwhile, Microsoft researchers who spoke to nurses, financial advisers, and teachers who use AI found that the technology makes people “atrophied and unprepared” cognitively.

Each study I referenced above has several anecdotes about individual workers who have found specific uses of AI that improve their own productivity and several companies have found uses of AI that have helped automate specific tasks, but most of the studies find that the industry- and economy-wide productivity gains that have been promised by AI companies are not happening. The MIT report calls this the “GenAI Divide,” where many companies are pushing expensive AI tools on their workers (and even more workers are using AI without explicit permission), but that few are seeing any actual return from it.




Using Moondream AI to Make Your Pi “See” Like a Human


Moondream title with man's face visible in background.

[Jaryd] from Core Electronics shows us human-like computer vision with Moondream on the Pi 5.

Using the Moondream visual language model, which runs directly on your Raspberry Pi, and not in the cloud, you can answer questions such as “are the clothes on the line?”, “is there a package on the porch?”, “did I leave the fridge open?”, or “is the dog on the bed?” [Jaryd] compares Moondream to an alternative visual AI system, You Only Look Once (YOLO).

Processing a question with Moondream on your Pi can take anywhere from just a few moments to 90 seconds, depending on the model used and the nature of the question. Moondream comes in two varieties, based on size, one is two billion parameters and the other five hundred million parameters. The larger model is more capable and more accurate, but it has a longer processing time — the fastest possible response time coming in at about 22 to 25 seconds. The smaller model is faster, about 8 to 10 seconds, but as you might expect its results are not as good. Indeed, [Jaryd] says the answers can be infuriatingly bad.

In the write-up, [Jaryd] runs you through how to use Moonbeam on your Pi 5 and the video (embedded below) shows it in action. Fair warning though, Moondream is quite RAM intensive so you will need at least 8 GB of memory in your Pi if you want to play along.

If you’re interested in machine vision you might also like to check out Machine Vision Automates Trainspotting With Unique Full-Length Portraits.

youtube.com/embed/ADuaiRnX5X0?…


hackaday.com/2025/09/23/using-…



Chrome per Android: Da un “muro di testo” ad un podcast il passo è breve


Google ha aggiunto una nuova funzionalità basata sull’intelligenza artificiale a Chrome per Android per la lettura delle pagine web.

Invece di leggere l’intero testo ad alta voce, il browser può riassumere il materiale in un formato “podcast”: due speaker sintetizzati discutono i punti chiave, trasformando un lungo articolo in un audio breve e vivace.

I primi utenti hanno notato la nuova funzionalità nella build stabile di Chrome 140.0.7339.124, quindi sembra che la funzionalità si stia gradualmente estendendo a un pubblico più ampio.

Puoi abilitare la voce fuori campo nello stesso modo: apri una pagina, clicca sui tre puntini nell’angolo in alto a destra e seleziona “Ascolta questa pagina”. Un nuovo interruttore per la voce fuori campo con intelligenza artificiale è apparso nel pannello di riproduzione accanto al controllo della velocità: ti consente di passare istantaneamente dalla lettura standard alla “versione podcast” del materiale.

Questa funzionalità è nata dal progetto NotebookLM, con cui Google ha lanciato per la prima volta le “Panoramiche Audio”, riassunti audio interattivi dei contenuti. In primavera, l’azienda ha aggiunto la stessa funzionalità all’app Gemini e ora sta proponendo l’idea al miliardo di utenti Chrome che utilizzano dispositivi mobili.

Podcast Voiceover era precedentemente disponibile nella versione sperimentale di Chrome Canary e in versione beta, ma ora sta per essere implementato nella build stabile. Come di consueto, il rilascio è graduale, quindi la funzionalità potrebbe non essere disponibile per tutti gli utenti contemporaneamente.

In breve, Chrome trasforma qualsiasi “muro di testo” in un formato compatto e facile da leggere, utile quando hai gli occhi stanchi, stai guidando o vuoi semplicemente far passare il messaggio in pochi minuti senza perderlo di vista.

L'articolo Chrome per Android: Da un “muro di testo” ad un podcast il passo è breve proviene da il blog della sicurezza informatica.




Cane non mangia cane.

Salis, commissione Europarlamento respinge revoca dell'immunità • Imola Oggi
imolaoggi.it/2025/09/23/salis-…



La Nato pronta a difendersi a ogni costo dalle minacce russe. Parola di Rutte

@Notizie dall'Italia e dal mondo

A seguito delle ultime violazioni dello spazio aereo lungo il fianco orientale dell’Europa, in particolare vicino ai confini con la Russia, l’allerta tra i Paesi membri della Nato è aumentata, con i vertici dell’Alleanza impegnati a ribadire la capacità di difesa e



Sviluppatori al sicuro: Mozilla introduce il rollback delle estensioni per Firefox


Mozilla ha introdotto una nuova funzionalità per gli sviluppatori di componenti aggiuntivi per Firefox che consente loro di ripristinare rapidamente una versione precedentemente approvata e di risolvere problemi critici in situazioni in cui la correzione e la nuova convalida dell’estensione richiederebbero troppo tempo.

La nuova logica consente agli utenti di rendere un aggiornamento recente non disponibile per l’installazione e, se gli aggiornamenti automatici sono abilitati, il browser ripristinerà automaticamente l’estensione alla build precedente entro 24 ore per gli utenti che hanno già installato la versione interessata.

I rollback vengono eseguiti ripubblicando la vecchia versione con un nuovo numero di release e distribuendola tramite il Developer Hub o l’API di invio dei componenti aggiuntivi, come spiegato da Mozilla. Per i componenti aggiuntivi ospitati su addons[.]mozilla[.]org, i rollback richiedono almeno due versioni approvate: è possibile ripristinare la build precedente a quella corrente.

In caso di autodistribuzione, le restrizioni sono più flessibili: è consentito il rollback a qualsiasi versione precedentemente approvata. Nel pannello di controllo, accanto al pulsante “Carica una nuova versione” è disponibile l’opzione “Rollback a una versione precedente”, che avvia il rollback.

Questa nuova funzionalità non elimina la necessità di un’attenta revisione e moderazione delle release, ma fornisce agli sviluppatori uno strumento per eseguire rapidamente il rollback e ridurre al minimo l’impatto delle build non riuscite. Per gli utenti, ciò significa un ritorno più rapido a una versione stabile e un rischio ridotto di problemi a lungo termine.

Quest’estate, Mozilla ha rafforzato la sicurezza del suo portale di componenti aggiuntivi implementando meccanismi per bloccare le estensioni fraudolente volte a prosciugare i portafogli di criptovalute. Andreas Wagner, responsabile del team di revisione e sicurezza dei contenuti di AMO, ha riferito che negli ultimi anni la piattaforma ha identificato e rimosso centinaia di componenti aggiuntivi fraudolenti, tra cui numerosi falsi portafogli di criptovalute.

A luglio, gli specialisti di Koi Security hanno rilevato oltre 40 estensioni contraffatte e altre 150 ad agosto. Le estensioni dannose si camuffavano da popolari wallet di criptovalute, tra cui Coinbase, Meta Mask, Trust Wallet, Phantom, Exodus, OKX, Keplr e MyMonero.

L'articolo Sviluppatori al sicuro: Mozilla introduce il rollback delle estensioni per Firefox proviene da il blog della sicurezza informatica.




Deepfake a 50$: il nuovo business del darknet preoccupa la cybersecurity


I ricercatori di Kaspersky Lab hanno scoperto annunci pubblicitari sul darknet che offrono la possibilità di creare deepfake video e audio in tempo reale. Il prezzo di questo servizio dipende dalla complessità e dalla lunghezza del contenuto falso, partendo da 50 dollari per i video e 30 dollari per i deepfake vocali.

I ricercatori avevano già scoperto offerte per la creazione di deepfake sul darknet. Tuttavia, ora gli aggressori offrono la possibilità di generare contenuti vocali e visivi falsi in tempo reale, e il costo di tali servizi è diminuito: solo nel 2023, il costo per creare un minuto di video deepfake raggiungeva i 20.000 dollari.

“Sulle piattaforme darknet, non vediamo solo annunci pubblicitari che offrono ‘deepfake-as-a-service’, ma anche una domanda per tali servizi. Gli aggressori sono attivamente interessati ai servizi di intelligenza artificiale e li stanno già utilizzando nelle loro operazioni. Allo stesso tempo, vediamo anche strumenti più sofisticati sul darknet: modelli linguistici di grandi dimensioni dannosi creati da zero, senza utilizzare LLM comuni, ed eseguiti localmente”

Gli annunci ora disponibili offrono diverse opzioni:

  • scambio di volti in tempo reale durante la comunicazione tramite una piattaforma di videoconferenza o messenger;
  • scambio di volti per la verifica;
  • scambio di immagini della fotocamera su un telefono o un dispositivo virtuale.

I fornitori di tali servizi sono anche disposti a fornire software che consentono di sincronizzare il labiale di una persona in un video con qualsiasi testo, anche in lingua straniera, nonché strumenti per la clonazione della voce, modificando tono e timbro per adattarli all’emozione desiderata.

Tuttavia, gli esperti non escludono la possibilità che una parte significativa di queste pubblicità sia una truffa progettata per estorcere denaro agli acquirenti interessati.

“Sebbene tali tecnologie non creino minacce informatiche fondamentalmente nuove, possono ampliare significativamente le capacità degli aggressori. In un simile contesto, gli esperti di sicurezza informatica devono impegnarsi seriamente per contrastare gli aggressori. Paradossalmente, una possibile direzione di sviluppo è quella di utilizzare soluzioni di intelligenza artificiale per migliorare la produttività degli specialisti della sicurezza informatica e l’efficacia delle soluzioni di sicurezza”, commenta Igor Kuznetsov, Direttore di Kaspersky GReAT.

L'articolo Deepfake a 50$: il nuovo business del darknet preoccupa la cybersecurity proviene da il blog della sicurezza informatica.



Giubileo 2025: Società San Vincenzo De Paoli, in 500 a Roma in Pellegrinaggio. “Abbracciare i poveri, chinarsi sulle ferite dei più fragili”




Una flotta di droni entro il 2035, il piano di Berlino per dominare i mari

@Notizie dall'Italia e dal mondo

Una flotta di navi/droni di grosso tonnellaggio per condurre missioni ad alto rischio e per tagliare sui tempi di addestramento, questa è la ricetta di Berlino per tornare sui mari. Secondo il documento strategico Kurs Marine, la Germania prevede l’acquisizione di tre



Anche l'Italia nella task force internazionale contro lo sfruttamento sessuale minorile


Oltre 20 paesi hanno partecipato all'operazione, ospitata presso la sede centrale di Europol all'Aia

Un totale di 51 bambini vittime di abusi sessuali sono stati identificati durante la 17a edizione della Victim Identification Task Force (#VIDTF17). L'operazione si è svolta nel corso di due settimane, dall'8 al 19 settembre 2025, presso la sede di #Europol. 27 esperti di Europol, #INTERPOL e 22 paesi in tutto il mondo hanno lavorato fianco a fianco per analizzare le immagini di bambini vittime di abusi non identificati, per identificarli e salvaguardarli.
Gli esperti partecipanti alla task force hanno analizzato oltre 300 set di dati raffiguranti vittime di sfruttamento sessuale minorile (CSE). Gli analisti hanno visto vittime di entrambi i sessi, dai bambini agli adolescenti, con una varietà di origini etniche e di molte nazionalità diverse. A seguito dell'operazione, alle autorità nazionali sono state inviate 213 piste per ulteriori indagini.

La Victim Identification Task Force (#VIDTF) è stata organizzata per la prima volta nel 2014. Da allora, il numero di set di dati analizzati è aumentato in modo esponenziale, insieme al database di Europol, creato nel 2006 e che ora contiene oltre 111 milioni di foto e video unici di sfruttamento sessuale minorile.

Oltre al crescente volume di immagini, lo scambio di materiale pedopornografico (CSAM) sembra ora essere molto più frequente rispetto al passato, probabilmente a causa dell'accessibilità e della grande capacità di archiviazione dei telefoni cellulari. Parallelamente, il CSAM generato dall’intelligenza artificiale è diventato uno dei modi principali in cui i trasgressori producono, acquisiscono e immagazzinano tale materiale.
Nel corso degli anni, i delinquenti hanno anche avuto accesso a strumenti e risorse più sofisticati. Oggi condividono anche tutorial sui forum del dark web che spiegano come creare CSAM iperrealistico generato dall’intelligenza artificiale.

Oltre 1 000 vittime salvaguardate riunendo le forze

Le autorità nazionali spesso non dispongono degli strumenti e delle risorse umane per far fronte alla quantità di CSAM creato e diffuso. Questo è il motivo per cui la Task Force per l’identificazione delle vittime è così preziosa nella lotta contro lo sfruttamento sessuale dei minori: riunisce esperti di molteplici nazionalità, facilita la comunicazione e rafforza la cooperazione tra le forze dell’ordine di tutto il mondo.
Nelle precedenti sedici edizioni del VIDTF, le autorità hanno salvaguardato un totale di 1 010 vittime, arrestato 301 autori di reato, analizzato 8 005 set di dati e diffuso 2 266 pacchetti di intelligence ai partner di Europol.

L'appello di Europol

Europol ha recentemente rilasciato nuove immagini sulla piattaforma “Stop agli abusi sui minori – Trace an Object” (europol.europa.eu/stopchildabu…), che invita tutti i cittadini a esaminare gli oggetti provenienti da casi irrisolti di abusi sessuali su minori e vedere se ne riconoscono qualcuno. Nessun indizio è troppo piccolo: anche il più piccolo dettaglio potrebbe aiutare a identificare e salvaguardare un bambino abusato sessualmente.

L'obiettivo principale è risalire all'origine degli oggetti raffigurati. Chiunque ne riconosca uno può fornire informazioni a Europol in modo anonimo. Una volta identificato il paese o il luogo, Europol informerà l'autorità competente di contrasto per indagare ulteriormente. L'obiettivo è quello di accelerare l'identificazione sia della vittima che dell'autore del reato.

@Attualità, Geopolitica e Satira

fabrizio reshared this.



L’Italia si doti di una strategia di sicurezza nazionale. L’appello dall’Osservatorio UniPegaso

@Notizie dall'Italia e dal mondo

L’Italia è l’unico Paese dell’Unione europea a non disporre ancora di una strategia di sicurezza nazionale. L’assenza di un documento strategico omnicomprensivo, capace di tracciare i profili delle principali minacce e di indicare le



Florida's attorney general claims Nutaku, Spicevids, and Segpay are in violation of the state's age verification law.

Floridax27;s attorney general claims Nutaku, Spicevids, and Segpay are in violation of the statex27;s age verification law.#ageverification


Florida Sues Hentai Site and High-Risk Payment Processor for Not Verifying Ages


Florida is suing massively popular anime and hentai games platform Nutaku, as well as the payment processor Segpay, in two complaints that allege the companies ignored the state’s age verification law.

Nutaku is owned by Aylo, which is also the parent company of Pornhub and some of the biggest porn platforms on the internet. Florida Attorney General James Uthmeier said in a press release last week that his office is suing Aylo and Segpay—a high-risk merchant account that specializes in adult entertainment—and alleges that the companies are violating state law HB3, which requires websites to verify that visitors based in Florida are at least 18 years old.

Uthmeier’s complaint against Segpay and its parent companies claims that because Segpay provides payment processing services to the adult gaming site xh.lustyheroes.com, which is owned by Gethins Ltd., one of the other defendants in that complaint, it should be on the hook for the site not verifying ages in Florida. Segpay also has a business address in Florida, according to the complaint and Segpay’s site.

The complaints were first reported by AVN. Corey Silverstein, an attorney representing Segpay, told AVN last week: "Segpay has yet to be served with any formal complaint and maintains a policy of not commenting on pending or threatened litigation.” Silverman told 404 Media Segpay has no additional comment.

The separate complaint against Nutaku and Aylo also names Spicevids, a site that curates videos from a variety of adult studios. Nutaku has two sites: a safe-for-work game site at nutaku.com, and a “lewd” game site at nutaku.net. Aylo started blocking access to several of its other porn sites, including Pornhub, when Florida’s age verification went into effect in January, but Spicevids and Nutaku’s sites remained available, requiring users to click a box to agree that they’re 18 but not requiring ID.

Florida Sues Huge Porn Sites Including XVideos and Bang Bros Over Age Verification Law
The lawsuit alleges XVideos, Bang Bros, XNXX, Girls Gone Wild and TrafficFactory are in violation of Florida’s law that requires adult platforms to verify visitors are over 18.
404 MediaSamantha Cole


“Aylo believes that Spicevids and Nutaku comply with Florida's age verification requirements. We intend to vigorously defend against these allegations in court,” a spokesperson for Aylo told 404 Media in a statement. “Spicevids has implemented age verification measures consistent with the law's requirements since it took effect on January 1. Nutaku's gaming platform operates within the law's parameters, as games containing sexually explicit content represent less than the statutory threshold. These platforms are committed to ongoing compliance with applicable state laws. We look forward to presenting the facts through the appropriate legal process.”

Florida’s law applies to sites with a “substantial portion,” defined as more than 33.3 percent of total material on the website, of adult material.

Age Verification Laws Drag Us Back to the Dark Ages of the Internet
Invasive and ineffective age verification laws that require users show government-issued ID, like a driver’s license or passport, are passing like wildfire across the U.S.
404 MediaEmanuel Maiberg


Both complaints start with the baseless claim: “Access to online pornography is a pervasive threat to the health and well-being of children and adolescents.”

Florida brought a similar lawsuit against major porn sites outside of the Aylo umbrella last month, claiming that XVideos, Bang Bros, XNXX, Girls Gone Wild and TrafficFactory were all flaunting the state’s age verification law.
playlist.megaphone.fm?p=TBIEA2…




The drone flight log data, which stretches from March 2024 to March 2025, shows CBP flying its drones to support ICE and other agencies. CBP maintains multiple Predator drones and flew them over the recent anti-ICE protests in Los Angeles.#FOIA


CBP Flew Drones to Help ICE 50 Times in Last Year


📄
This article was primarily reported using public records requests. We are making it available to all readers as a public service. FOIA reporting can be expensive, please consider subscribing to 404 Media to support this work. Or send us a one time donation via our tip jar here.

Customs and Border Protection (CBP) flew its drones, which could include the agency’s MQ-9 Predator drones, at least 50 times last year in support of Immigration and Customs Enforcement (ICE), according to new data obtained by 404 Media.

The data shows that CBP continues to support not just ICE but other federal agencies, such as the FBI, with its fleet of drones. In June, 404 Media reported CBP flew two high-powered Predator drones above protests in Los Angeles, flights which CBP said were to provide “officer safety surveillance.”

“This is especially concerning, given ICE’s ongoing unlawful immigration sweeps and this administration’s concerted effort to suppress any dissent,” Jennifer Lynch, general counsel for activist organization the Electronic Frontier Foundation (EFF), which has previously researched CBP’s use of drones, told 404 Media. “These records show that CBP has never stopped operating its drones on behalf of other federal, state, and local agencies, including ICE. In fact, the program has expanded exponentially since EFF first reported on it in 2012.”

💡
Do you know anything else about CBP’s drones or other technology? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

The new data spans more than 3,100 flights between March 2024 and March 2025. It includes the date of each mission, its category such as whether the flight was for training or enforcement purposes, the mission type (such as reconnaissance against a target), the region the flight took place in, which branch was responsible, and a column that often mentions if the flight was in support of another agency.

For example, on October 22, 2024, CBP flew a drone as part of “investigative support” for ICE as part of its enforcement mission, according to the data. CBP also flew drones for ICE over the next four days, the data shows.

On November 7, 2024, CBP flew a drone to assist ICE with a “special security event,” according to the data.

On February 21, 2024, CBP helped ICE with “reconnaissance surveillance target acquisition,” the data shows.
playlist.megaphone.fm?p=TBIEA2…
In all, CBP flew drones to assist ICE in some capacity a total of 50 times during the one year period the data relates to. 404 Media obtained the data through a Freedom of Information Act (FOIA) request with CBP. The majority of the data covers the Biden presidency, and shows that CBP collaborated regularly with ICE during that administration. But given Trump’s recent crackdowns on protests and the administration’s mass deportation effort, Lynch is concerned about that collaboration during the current presidency.

The data also shows CBP flying drones to assist the U.S. Coast Guard; the DEA and FBI with investigative support; U.S. Southern Command (SOUTHCOM), a part of the military; and in one case the Office of the President of the United States. Other flights are listed as assisting “states” and “local,” indicating CBP assisted local and state agencies too. Some flights are for relocating the drones or for maintenance, the data shows.

The EFF previously obtained similar drone flight logs. Some of those records list more specific organizations CBP has flown drones for, including particular state bodies. In 2014, the EFF found CBP loaned its drones to other agencies more than 700 times in three years.
A screenshot from the data.
CBP’s fleet includes around ten drones, according to a presentation available online. They include the Predator B, which is essentially an unarmed version of the same drone the U.S. flies overseas as part of combat operations. The drones are typically loaded with cameras and other surveillance technology. After flying Predator drones during the recent Los Angeles protests, the official Department of Homeland Security X account posted footage collected by the drones.

“CBP’s drones are equipped with many different types of surveillance technology, from thermal imaging to high definition cameras to tools that can track movement over time. Smaller drones can identify faces and license plates while larger drones like the MQ-9s used to surveil protestors in Los Angeles have extensive range and can stay in the air for 30 hours at a time,” Lynch said.

CBP told 404 Media drones are a critical part of the agency’s border security mission. The agency said this includes illicit border crossings, investigations, intelligence, and reconnaissance patrols. CBP said its drones are only equipped with electro-optical/infrared cameras and Vehicle and Dismount Exploitation Radar (VADER). This can detect vehicle and human movement, the agency said.

Lynch added “Drone surveillance, especially when combined with ICE’s unregulated access to sensitive data like millions of drivers’ license plate records, threatens the privacy and security of people all across the country.”


#FOIA


ClickFix: la truffa che inganna gli utenti Mac e installa il trojan AMOS


I criminali informatici hanno lanciato una campagna su larga scala contro gli utenti macOS, camuffando malware da programmi popolari. Lo ha segnalato LastPass, che ha scoperto che anche il suo prodotto era stato falsificato. Il malware viene distribuito tramite falsi repository GitHub ottimizzati per i motori di ricerca, che gli consentono di apparire in cima ai risultati di ricerca di Google e Bing.

L’attacco utilizza lo schema ClickFix: alla vittima viene chiesto di inserire un comando nel terminale, presumibilmente per installare un’applicazione. In realtà, la vittima esegue una richiesta curl a un URL crittografato e scarica lo script install.sh nella directory /tmp.

Questo file installa il trojan Atomic Stealer (AMOS) sul computer. AMOS è uno strumento MaaS (Malware-as-a-Service) il cui noleggio costa 1.000 dollari al mese. La sua funzione di base è rubare dati dai dispositivi infetti, ma i suoi creatori hanno recentemente aggiunto una backdoor per un accesso furtivo e persistente al sistema.

Secondo LastPass, i truffatori non si limitano a copiare un singolo marchio. L’elenco dei programmi contraffatti supera i 100 e include soluzioni come 1Password, Dropbox, Confluence, Robinhood, Fidelity, Notion , Gemini, Audacity, Adobe After Effects, Thunderbird e SentinelOne.

Per aggirare le restrizioni, i truffatori creano diversi account GitHub falsi e repository duplicati con un pulsante “Download”. Cliccando su questo pulsante si accede a un sito web secondario contenente le istruzioni per eseguire un comando nel terminale.

Scenari simili per macOS sono già stati documentati in precedenza. Rapporti precedenti includevano copie di Booking.com e pseudo-programmi per “risolvere problemi” nel sistema, distribuiti tramite annunci pubblicitari. La campagna attuale è significativamente più ampia: l’automazione consente la rapida riattivazione di nuove pagine dopo il blocco.

LastPass sottolinea che monitora costantemente la situazione e inoltra segnalazioni di progetti falsi all’amministrazione di GitHub, ma la minaccia rimane a causa della facilità di creazione di nuove risorse.

Gli esperti ricordano agli utenti di fidarsi solo dei siti web ufficiali degli sviluppatori. Se il produttore non offre una versione macOS di un prodotto, l'”alternativa” sarà quasi certamente dannosa.

Nei casi in cui un’app sia disponibile, è importante verificare che sia distribuita da una fonte attendibile e non da una terza parte sconosciuta.

L'articolo ClickFix: la truffa che inganna gli utenti Mac e installa il trojan AMOS proviene da il blog della sicurezza informatica.



The Impending CRT Display Revival Will Be Televised


Until the 2000s vacuum tubes practically ruled the roost. Even if they had surrendered practically fully to semiconductor technology like integrated circuits, there was no escaping them in everything from displays to video cameras. Until CMOS sensor technology became practical, proper video cameras used video camera tubes and well into the 2000s you’d generally scoff at those newfangled LC displays as they couldn’t capture the image quality of a decent CRT TV or monitor.

For a while it seemed that LCDs might indeed be just a flash in the pan, as it saw itself competing not just with old-school CRTs, but also its purported successors in the form of SED and FED in particular, while plasma TVs made home cinema go nuts for a long while with sizes, fast response times and black levels worth their high sale prices.

We all know now that LCDs survived, along with the newcomer in OLED displays, but despite this CRTs do not feel like something we truly left behind. Along with a retro computing revival, there’s an increasing level of interest in old-school CRTs to the point where people are actively prowling for used CRTs and the discontent with LCDs and OLED is clear with people longing for futuristic technologies like MicroLED and QD displays to fix all that’s wrong with today’s displays.

Could the return of CRTs be nigh in some kind of format?

What We Have Lost


As anyone who was around during the change from CRT TVs to ‘flat screen’ LCD TVs can attest to, this newfangled display technology came with a lot of negatives. Sure, that 21″ LCD TV or monitor no longer required a small galaxy of space behind the display on the desk or stand, nor did it require at least two people to transport it safely, nor was the monitor on your desk the favorite crispy warm napping spot of your cat.

The negatives mostly came in the form of the terrible image quality. Although active matrix technology fixed the smearing and extreme ghosting of early LC displays at higher refresh rates, you still had multi-millisecond response times compared to the sub-millisecond response time of CRTs, absolutely no concept of blacks and often horrendous backlight bleeding and off-angle visual quality including image inverting with TN-based LCD panels. This is due to how the stack of filters that make up an LC display manipulate the light, with off-angle viewing disrupting the effect.
Color shift comparison for IPS (X800H) versus VA (H9G) LC displays. (Credit: RTINGS)Color shift comparison for IPS (X800H) versus VA (H9G) LC displays. (Credit: RTINGS)
Meanwhile, CRTs are capable of OLED-like perfect blacks due to phosphor being self-luminous and thus requiring no backlight. This is a feat that OLED tries to replicate, but with its own range of issues and workarounds, not to mention the limited lifespan of the organic light-emitting diodes that make up its pixels, and their relatively low brightness that e.g. LG tries to compensate for with a bright white sub-pixel in their WOLED technology.

Even so, OLED displays will get dimmer much faster than the phosphor layer of CRTs, making OLED displays relatively fragile. The ongoing RTINGS longevity test is a good study case of a wide range of LCD and OLED TVs here, with the pixel and panel refresh features on OLEDs turning out to be extremely important to even out the wear.

CRTs are also capable of syncing to a range of resolutions without scaling, as CRTs do not have a native resolution, merely a maximum dot pitch for their phosphor layer beyond which details cannot be resolved any more. The change to a fixed native resolution with LCDs meant that subpixel rendering technologies like Microsoft’s ClearType became crucial.

To this day LCDs are still pretty bad at off-angle performance, meaning that you have to look at a larger LCD from pretty close to forty-five degrees from the center line to not notice color saturation and brightness shifts. While per-pixel response times have come down to more reasonable levels, much of this is due to LCD overdriving, which tries to compensate for ghosting by using higher voltages for the pixel transitions, but can lead to overshoot and a nasty corona effect, as well as reduce the panel’s lifespan.
Blur Busters pursuit camera example of blur reduction. (Credit: Blur Busters)Blur Busters pursuit camera example of blur reduction. (Credit: Blur Busters)
Both OLEDs and LCDs suffer from persistence blurring even when their pixel-response times should be fast enough to keep up with a CRT’s phosphors. One current workaround is to insert a black frame (BFI) which can be done in a variety of ways, including strobing the backlight on LCDs, but this is just one of many motion blur reduction workarounds.

As noted by the Blur Busters article, some of these blur reduction approaches work better than others, with issues like strobe crosstalk generally still being present, yet hopefully not too noticeably.

In short, modern LCDs and OLED displays are still really quite bad by a number of objective metrics compared to CRTs, making it little wonder that there’s a strong hankering for something new, along with blatant nostalgia for plasma and CRT technology, flawed as they are. That said, we live in 2025 and thus do not have to be constrained by the technological limitations of 1950s pre-semiconductor vacuum tube technology.

The SED Future

An LG Flatron CRT TV from around 2007. (Credit: Briho, Wikimedia)An LG Flatron CRT TV from around 2007. (Credit: Briho, Wikimedia)
One major issue with CRTs is hard to ignore, no matter how rose-tinted your nostalgia glasses are. Walking into an electronics store back in the olden days with a wall of CRT TVs on display you’re hit by both the high-pitched squeal from the high-voltage flyback converters and the depth of these absolute units. While these days you got flat panel TVs expanding into every larger display sizes, CRT TVs were always held back by the triple electron gun setup. These generate the electrons which are subsequently magnetically guided to the bit of phosphor that they’re supposed to accelerate into.

Making such CRTs flat can be done to some extent by getting creative with said guidance, but with major compromises like divergence and you’ll never get a real flat panel. This dilemma led to the concept of replacing the glass tube and small number of electron guns with semiconductor or carbon-nanotube electron emitters. Placed practically right on top of the phosphor layer, each sub-pixel could have its own miniscule electron gun this way, with the whole setup being reminiscent of plasma displays in many ways, just thinner, less power-hungry and presumably cheaper.

Internal structures of SED (top) versus FED, showing the difference between the cathode plates. (Source: Fink et al., Applied Nanotech, 2007)Internal structures of SED (top) versus FED, showing the difference between the cathode plates. (Source: Fink et al., Applied Nanotech, 2007)
Canon began research on Surface-conduction Electron-Emitter Display (SED) technology in 1986 as a potential successor to CRT technology. This was joined in 1991 by a similar ‘ThinCRT’ effort that used field emission, which evolved into Sony’s FED take on the very similar SED technology. Although both display technologies are rather similar, they have a very different emitter structure, which affects the way they are integrated and operated.

Both of them have in common that they can be very thin, with the thickness determined by the thickness of the cathode plate – featuring the emitters – combined with that of the anode and the vacuum space in between. As mentioned in the review article by Fink et al. from 2007, the vacuum gap at the time was 1.7 mm for a 36″ SED-type display, with spacers inside this vacuum providing the structural support against the external atmosphere not wanting said vacuum to exist there any more.

This aspect is similar to CRTs and vacuum fluorescent displays (VFDs), though one requirement with both SED and FED is to have a much better vacuum than in CRTs due to the far smaller tolerances. While in CRTs it was accepted that the imperfect vacuum would create ions in addition to electrons, this molecule-sized issue did necessitate the integration of so-called ion traps in CRTs prior to aluminized CRT faces, but this is not an option with these new display types.

For SEDs and FEDs there is fortunately a solution to maintain a pure vacuum through the use of so-called getters, which is a reactive material that reacts with gas molecules to remove them from the vacuum gap. With all of this in place and the unit sealed, the required driving voltage for SED at the time was about 20V compared to 50-100V for FED, which is still far below the kilovolt-level driving voltage for CRTs.

A Tenuous Revival


Both the companies behind SED and Sony decided to spin down their R&D on this new take on the veritable CRT, as LCDs were surging into the market. As consumers discovered that they could now get 32+” TVs without having to check the load-bearing capacity of their floor or resorting to the debauchery of CRT (rear) projectors, the fact that LCD TVs weren’t such visual marvels was a mere trifle compared to the fact that TVs were now wall-mountable.

Even as image quality connoisseurs flocked first to plasma and then OLED displays, the exploding market for LCDs crowded out alternatives. During the 2010s you’d find CRTs discarded alongside once prized plasma TVs, either given away for practically free or scrapped by the thousands. Then came the retro gaming revival, which is currently sending the used CRT market skyrocketing, and which is leading us to ask major questions about where the display market is heading.

Although CRTs never really went away from a manufacturing point of view, it’s mostly through specialized manufacturers like Thomas Electronics who will fulfill your CRT fix, though on a strict ‘contact us for a quote’ basis. Restarting a mass-manufacturing production line for something like once super-common CRT TVs would require a major investment that so far nobody is willing to front.

Meanwhile LCD and OLED technology have hit some serious technological dead-ends, while potential non-organic LED alternatives such as microLED have trouble scaling down to practical pixel densities and yields.

There’s a chance that Sony and others can open some drawers with old ‘thin CRT’ plans, dust off some prototypes and work through the remaining R&D issues with SED and FED for potentially a pittance of what alternative, brand-new technologies like MicroLED or quantum dot displays would cost.

Will it happen? Maybe not. It’s quite possible that we’ll still be trying to fix OLED and LCDs for the next decade and beyond, while waxing nostalgically about how much more beautiful the past was, and the future could have been, if only we hadn’t bothered with those goshdarn twisting liquid crystals.


hackaday.com/2025/09/23/the-im…