This Week in Security: The Rest of the IPv6 Story, CVE Hunting, and Hacking the TSA
We finally have some answers about the Windows IPv6 vulnerability — and a Proof of Concept! The patch was a single change in the Windows TCP/IP driver’s Ipv6pProcessOptions()
, now calling IppSendError()
instead of IppSendErrorList()
. That’s not very helpful on its own, which is why [Marcus Hutchins]’s analysis is so helpful here. And it’s not an easy task, since decompiling source code like this doesn’t give us variable names.
The first question that needs answered is what is the list in question? This code is handling the option field in incoming IPv6 packets. The object being manipulated is a linked list of packet structs. And that linked list is almost always a single member list. When calling IppSendErrorList()
on a list with a single member, it’s functionally equivalent to the IppSendError()
in the fixed code. The flaw must be in the handling of this list with multiple members. The only way to achieve that criteria is to send a lot of traffic at the machine in question, so it can’t quite keep up with processing packets one at a time. To handle the high throughput, Windows will assemble incoming packets into a linked list and process them in batch.
So what’s next? IppSendErrorList()
, takes a boolean and passes it on to each call of IppSendError()
. We don’t know what Microsoft’s variable name is, but [Marcus] is calling it always_send_icmp
, because setting it to true means that each packet processed will generate an ICMP packet. The important detail is that IppSendError()
can have side effects. There is a codepath where the packet gets reverted, and the processing pointer is set back to the beginning of the packet. That’s fine for the first packet in the list, but because the function processes errors on the entire list of packets, the state of the rest of those packets is now much different from what is expected.
This unexpected but of weirdness can be further abused through IPv6 packet fragmentation. With a bit of careful setup, the reversion can cause a length counter to underflow, resulting in data structure corruption, and finally jumping code execution into the packet data. That’s the Remote Code Execution (RCE). And the good news, beyond the IPv6-only nature of the flaw, is that so far it’s been difficult to actually pull the attack off, as it relies on this somewhat non-deterministic “packet coalescing” technique to trigger the flaw.
CVE Hunting Made Easy
[Eddie Zhang] wanted to take the easy road to finding CVEs. To his immense credit, he did not ask ChatGPT to hallucinate vulnerabilities for him, but instead built an automation chain to find possible vulns. The idea is simple: Download as many WordPress plugins as he could, run Semgrep over the corpus, throw the results in a SQL database, and take a closer look at the most promising findings.
That starts by writing a SQL query, naturally. The interesting flaws were SELECTed, and then the different plugins run in a test bench setup to try to trigger actual vulnerable code. And it’s not a bad approach, judging by the 14 CVEs found in 3 afternoons of work.
Moodle
RedTeam Pentesting got to have a field day with the Moodle platform. Moodle is a web-based distance learning solution written in PHP. And to get the flavor of how this went, the test grading logic is written in PHP — and eval()
‘d on the server during grading. Now it’s not quite as bad as it sounds. There is sanitization done, and the set of symbols, characters, and functions are rather limited.
PHP has a pretty interesting type system. Something like acos(2)
, inverse of the cosine of 2, returns a result of Not a Number, or NAN. The dot .
symbol does string concatenation in PHP, and putting those together, acos(2) . acos(2)
results in a string, NANNAN
. It gets better, as it’s then possible to do bitwise manipulation of those strings, eventually unlocking the entire alphabet. A few more tricks like PHP’s variable functions, variable variables, and other fun language contortions. Eventually we get to system() and escape into the system.
Hacking the TSA
[Ian Carroll] and [Sam Curry] bring an unfortunate tale of clever hacking, cover ups, and incompetence. The actual hack is pretty straightforward, a SQL injection in a login system. The real problem is that this login is in the official airline security systems that controls the Known CrewMember and Cockpit Access Security System. That’s the list of people that get to skip TSA checkpoints altogether, and that get access to airplane cockpits in flight. Not good.
The good news is that after disclosure, the Department of Homeland Security quickly secured the vulnerable site. The takes a turn for the worse, when it came time for disclosure. TSA issues a factually incorrect statement about what is required to use the KCM system. [Ian] and [Sam] reached out again to try to set the record straight about the severity of the finding. In response, the TSA quietly deleted the FAQ that spells out how bad the vulnerability could be. Not a great look.
Bits and Bytes
For your data and packet capture needs, Wireshark 4.4 is out. Among the normal improvements, there’s better VoIP support, a handful of new protocols, and some IPv6 tweaks to make life easier.
Ever wondered how to do effective sandboxing in Linux? Hardened Linux has you covered. There are some obvious things like limited filesystem access, but it might be more useful to read about seccomp to limit the available system calls to your sandboxed program. The article is an overview of the individual techniques, and then some of the more popular all-in-one solutions like firejail, bubblewrap, and landlock.
Volt Typhoon, a collection of hackers believed to be working on behalf of the Chinese government has begun using a vulnerability in Versa Director to attack businesses. Version 22.1.4 of the network management platform fixes the vulnerability, which allowed for executable java filew to be disguised as PNGs and uploaded to the platform.
And finally, one of the sneakier ways to stay on a Linux system is to use udev. For attackers, it’s always a challenge to make sure the malware starts up on each boot, and yet doesn’t attract any attention. There are plenty of places to hide a startup hook, but this one creates a udev rule to automatically run early in boot when the /dev/random device is created. How often do you audit your udev files? Sneaky!
Destra e sinistra? Time out. Un terzo polo avrebbe il 10%, lo spazio c’è
L'articolo Destra e sinistra? Time out. Un terzo polo avrebbe il 10%, lo spazio c’è proviene da Fondazione Luigi Einaudi.
2024 Tiny Games Contest: Blind Maze Is Fun For All
If you think about it, even difficult mazes on paper are pretty easy. You can see all the places you can and can’t go, and if you use a pencil instead of a pen, well, that’s almost like cheating.
However, using a pencil is pretty much a necessity to play [penumbriel]’s Blind Maze. In this game, you can’t even see the maze, or where you are. Well, that’s not exactly true — you can “touch” the wall (or lack thereof) in front of you and to the sides, but that’s it. So you’re going to need that pencil to draw out a map as you go along.
This game runs on an Arduino Nano and a 18650 cell. There are three LEDs deep within the enclosure, which is meant to give the depth of walls. But, even the vision-impaired can play the Blind Maze, because there’s haptic feedback thanks to a small vibration motor.
If you want to play in hard mode, there’s a hidden paperclip-accessible switch that turns off the LEDs. This way, you have to rely on hitting the walls with your head. Be sure to check out the video below.
youtube.com/embed/rd01wIHwtz8?…
Walking the Plank: Add-Ons for the Bus Pirate
The Bus Pirate multi-tool has held a place of honor in many a hardware hacker’s toolbox for years, and the latest generation of the gadget powered by the Raspberry Pi RP2040/RP2350 offers significantly enhanced capabilities over the original PIC versions. We took a look at the new Bus Pirate when it started shipping back in February, and while the firmware was still in the early stages back then, it was already clear that creator [Ian Lesnet] and his team had put together a compelling product.
Over the last several months, the Bus Pirate software has improved dramatically. New features have started showing off the hardware’s capabilities, and the user experience is far improved over where it was at release. Following the firmware development is a roller coaster ride, with [Ian] sometimes pushing out several updates a day. Luckily, like the Pi Pico itself, updating the new Bus Pirate only takes a second.
But as impressive and important as those software updates have been, that’s not what we’re talking about today. In this post, we’ll take a look at one of the most exciting aspects of the new Bus Pirate — the ability to easily develop add-on modules for it.
Bus Pirate Versions
Before we get too far, I should mention that there are now a couple of new Bus Pirate versions on the market, which makes talking about the product a little confusing.The new Bus Pirate 6
The Bus Pirate 5, which started shipping in February and remains available, is powered by the RP2040. It is the first major version of the hardware to see a wide release since the Bus Pirate 3. Since the team got early access to the RP2350 chip, they were also able to produce two new variants: the 5XL and the 6.
What are the differences between them all? The 5XL uses the RP2350A and is essentially just a faster version of the 5 thanks to the more powerful cores and additional RAM offered by the new Raspberry Pi silicon. The 6 is based on the RP2350B and takes advantage of the additional GPIO pins by deleting some of the I/O expander chips that were necessary on the 5 and 5XL. This not only makes I/O faster but frees up space on the board to implement a “follow along” logic analyzer that automatically records everything that’s happening on the bus.
All that being said, for the purposes of this article, it doesn’t actually matter.
One Port To Rule Them All
Regardless of which version of the Bus Pirate you get (5/5XL/6), they all feature the same 10-pin connector on the side. This is where you’d normally connect up your probes, and thanks to the display on the top of the Bus Pirate, you don’t even have to remember the pinout — when you switch modes on the device, the screen will be updated to show which pin does what.
This is where things start to get interesting. Since the connector on the side is nothing more exotic than a male 2.54 mm pitch header, interfacing with it through custom hardware is incredibly simple. You don’t need to hunt down some special connector — making a board that can plug into the BP5 (or beyond) can be as easy as soldering a female header onto a scrap of perfboard. Even better, since you don’t have to worry about creating a custom footprint, developing your own add-on PCBs is a breeze.
Designing Custom Expansions
Creating your own piece of hardware that plugs into the Bus Pirate is as easy as adding a right-angle 2.54 mm female header to the edge of your PCB. You might think the fact that the pinout changing depending on what mode the device is in would be a problem, but in practice, your add-on is likely going to require the user to set a corresponding mode anyway (I2C, SPI, UART, etc).
Over on the Bus Pirate forums, user [grymoire] is responsible for coming up with the idea of calling these expansions “planks” after drawing comparisons with the “hats” and “shields” used by other development boards. Why a plank? Well, for one, it fits the pirate theme. When plugged into the Bus Pirate, the expansions also look a bit like a plank hanging out over the side of a pirate ship.
As an example, I recently put together the SAO Plank: a small adapter that lets me connect three Simple Add-Ons to the Bus Pirate. This is not only a convenient way of powering the badge expansions and monitoring their current consumption using the Bus Pirate’s onboard display, but it also provides a way to debug and test I2C communications between several SAOs — a capability that will become more useful as we get closer to Supercon 2024.
There’s really not much going on in the SAO Plank, and frankly, I could have wired the thing up on a perfboard. Even the power LED I added is technically superfluous, as the technicolor lights produced by the Bus Pirate leave no question as to whether or not it’s turned on. But it was so cheap and easy to turn this into its own board, so why not?
I’m eager to see what the community comes up with when presented with such a low-friction path to coming up with custom Bus Pirate expansions.
Collect Em’ All
Bus Pirate planks aren’t just limited to DIY. Since releasing the Bus Pirate 5, a number of official planks have been introduced. Some of these are still in development, such as the “IR Toy” that [Ian] has been documenting in a thread on the forums. Others are already available for purchase, such as an assortment of adapters that make it easier to work with SPI flash chips and one for interfacing with SLE4442 Secure Memory Cards.
One of the advantages of the official planks is that the firmware is likely to get baked-in support for any special functions they may have. Even though the IR Toy hasn’t officially been released, last week a new mode was added to the stable build of the firmware that can interface with it and send NEC IR codes. Then again, as the firmware is open source, even DIY planks could get their own modes should somebody be so inclined to write the code for them.
Whether they’re an official product or a homebrew project from the community, the Bus Pirate Planks are a very exciting addition to an already fantastic tool. If you happen to see an interesting Plank in the wild, or end up making one yourself, be sure to let us know.
Apple’s Huge “Dual Use” Face Swap App Problem Is Not Going Away
Maybe Apple should ban face swapping apps entirely.Emanuel Maiberg (404 Media)
Adjustable Electric Hand Warmers
It may be the last gasp of summer here in the Northern Hemisphere, but it’s always cold somewhere, whether it’s outdoors or inside. If you suffer from cold, stiff hands, you know how difficult it can be to work comfortably on a computer all day. Somehow, all that typing and mousing does little to warm things up. What you need are hand warmers, obviously, and they might as well be smart and made to fit your hands.
Fifteen-year-old [Printerforge] created these bad boys in an effort to learn how to code LCDs and control heat like Magneto controls ferrous metals. Thanks to digital control, they can heat up to specific temperatures, and they happen to run for a long time.
Power-wise, these warmers use a 18650 cell and a TP4056 charging module. Everything is controlled by an Arduino Nano, which reads from both a thermistor and a potentiometer to control the output.
[Printerforge] really thought this project through, as you’ll see in the Instructable. There’s everything from a table of design requirements to quick but thorough explanations of nichrome wire and basic electronic theory.
And then there’s the material consideration. [Printerforge] decided that polymer clay offers the best balance of heat conductivity and durability. They ended up with two styles — flat, and joystick grip. The best part is, everything can fit in a generous pocket.
Clay is good for a lot of things, like making the perfect custom mouse.
Podcast: Is the Arrest of Telegram Founder Pavel Durov an Attack on Encryption?
The 404 Media podcast discusses France's crackdown on Telegram.Jason Koebler (404 Media)
New 2 GB Raspberry Pi 5 Has Smaller Die and 30% Lower Idle Power Usage
Recently Raspberry Pi released the 2GB version of the Raspberry Pi 5 with a new BCM2712 SoC featuring the D0 stepping. As expected, [Jeff Geerling] got his mitts on one of these boards and ran it through its paces, with positive results. Well, mostly positive results — as the Geekbench test took offence to the mere 2 GB of RAM on the board and consistently ran out of memory by the multi-core Photo Filter test, as feared when we originally reported on this new SBC. Although using swap is an option, this would not have made for a very realistic SoC benchmark, ergo [Jeff] resorted to using sysbench
instead.
Naturally some overclocking was also performed, to truly push the SoC to its limits. This boosted the clock speed from 2.4 GHz all the way up to 3.5 GHz with the sysbench
score increasing from 4155 to 6068. At 3.6 GHz the system wouldn’t boot any more, but [Jeff] figured that delidding the SoC could enable even faster speeds. This procedure also enabled taking a look at the bare D0 stepping die, revealing it to be 32.5% smaller than the previous C1 stepping on presumably the same 16 nm process.
Although 3.5 GHz turns out to be a hard limit for now, the power usage was interesting with idle power being 0.9 watts lower (at 2.4 W) for the D0 stepping and the power and temperatures under load also looked better than the C1 stepping. Even when taking the power savings of half the RAM versus the 4 GB version into account, the D0 stepping seems significantly more optimized. The main question now is when we can expect to see it appear on the 4 and 8 GB versions of the SBC, though the answer there is likely ‘when current C1 stocks run out’.
La campagna DevPopper prende di mira gli sviluppatori di software
- È stata osservata una campagna di ingegneria sociale in corso che prendeva di mira gli sviluppatori di software.
Apple, TikTok, Google e Facebook forniscono i tuoi dati alle forze dell'ordine fino all'80% delle volte
Google ha anche divulgato "alcune" informazioni alle forze dell'ordine quando richiesto.
🔁 Alla Durex è sfuggito qualcosa Ossia i dati di alcuni clienti della filiale indiana, compresi i dettagli degli ordini di preservativi e lubrifica...
Alla Durex è sfuggito qualcosa
Ossia i dati di alcuni clienti della filiale indiana, compresi i dettagli degli ordini di preservativi e lubrificanti
Informa Pirata: informazione e notizie
Alla Durex è sfuggito qualcosa Ossia i dati di alcuni clienti della filiale indiana, compresi i dettagli degli ordini di preservativi e lubrificanti https://www.wired.Telegram
action.assangecampaign.org.au/
Informa Pirata: informazione e notizie
Una lettera aperta al POTUS per un perdono ad Assange. Se vi sembra adeguata, potete firmarla, e se volete anche diffonderla. https://www.action.assangecampaign.org.au/Telegram
RFanciola reshared this.
Unsere Wasserkraft & KSV 1870: Elettricità pulita solo dopo un controllo del credito sporco?
Unsere Wasserkraft rifiuta i clienti sulla base di classifiche di credito automatizzate. noyb ha presentato un reclamo
mickey29 August 2024
lindipendente.online/2024/08/3…
giuliochinappi.wordpress.com/2…
GAZA. Amnesty: indagare i raid compiuti senza proteggere i civili palestinesi
@Notizie dall'Italia e dal mondo
L'Ong per i diritti umani scrive che gli attacchi israeliani contro Hamas e i combattenti di altri gruppi armati che hanno ucciso decine di civili sfollati a Rafah dovrebbero essere indagati come crimini di guerra
L'articolo GAZA. Amnesty: indagare i
Inizia la censura...
La UE investigará a Telegram
La Unión Europea anunció que abrirá una investigación contra la aplicación de mensajería instantánea por posible violación de las reglas digitales, al no haber facilitado las cifras exactas sobre la cantidad de usuarios.
En el caso de que la app haya declarado menos internautas de los que tiene, y si los usuarios superan el umbral de los 45 millones mensuales, Bruselas podría imponer a Telegram una nueva normativa de control que aprobó este año.
La plataforma declaró en febrero que tenía 41 millones de usuarios al mes, pero en agosto se le pidió una actualización y la respuesta fue ambigua, pues no dio ninguna cifra y se limitó a decir que tenía "un número significativamente inferior a 45 millones de receptores activos mensuales de promedio".
El Reglamento de Servicios Digitales de la UE obliga a las grandes plataformas a moderar los contenidos, recibir auditorías de terceros y facilitar datos a la Comisión Europea, entre otras reglas.
La pesquisa de la Comisión Europea coincide con la del Gobierno francés sobre presuntas ilegalidades cometidas en Telegram, lo que condujo a la detención de su CEO, Pável Dúrov, y a la orden de búsqueda del otro cofundador de la plataforma, su hermano mayor Nikolái.
En Facebook e Instagram se cometieron los mismos delitos por los que se acusa a Telegram, pero la Justicia francesa no ha emitido una orden de búsqueda y captura contra Mark Zuckerberg.
Fuente: Financial Times
ilfattoquotidiano.it/2024/08/3…
Le vittime collaterali di Stellantis: il collasso manda in crisi decine di aziende dell’indotto da…
Da Torino a Melfi a rischio migliaia di posti - La mappaAndrea Tundo (Il Fatto Quotidiano)
Postulo che i titolisti siano i primi responsabili della disinformazione.
Da quando, su Internet, la "trazione" generata da un titolo è precisamente misurabile in click la corsa all'intestazione più acchiappaclick è diventata talmente agguerrita da meritarsi un posto alle Olimpiadi. È lo stramaledetto clickbait.
Non importa più che il titolo rifletta in maniera succinta i contenuti dell'articolo, basta che incuriosisca il lettore abbastanza da cliccare. E allora daje de titoli scandalistici o palesemente falsi.
Questo non sarebbe un enorme problema se tutti andassero a leggere gli articoli così mal intitolati, anzi: sgamando subito l'opera di un titolista truffaldino, ce ne andremmo immediatamente dalla pagina (con conseguente crollo dei tempi di permanenza su di essa, altra metrica rilevante) e non torneremmo più su quella testata.
Ma questo non succede: nello scrollare quotidianamente la timeline di un social o il feed di un aggregatore RSS si leggono.... Al 90% solo i titoli? Ed ecco che la frittata è fatta.
Se leggo un titolo che dice "Studio dimostra l'inefficacia dei vaccini COVID" e non vado a leggere l'articolo, che magari, al contrario, parla di uno studio che dimostra l'efficacia al 95% e mi dettaglia in quali casi non lo è, ho assorbito un'informazione non solo errata, ma diametralmente opposta al senso della notizia.
Tutto per dei cazzi di click.
Google dice che la SEO ha rovinato l'Internet. Va bene che tralascia il fatto che se la SEO esiste è perché sono loro ad aver stabilito le regole del ranking, ma di per sé l'affermazione non è scorretta.
La verità, online, vale meno della visibilità.
reshared this
I costi ambientali della rivoluzione tecnologica secondo le Nazioni Unite
@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori
L'Onu lancia l'allarme sui costi ambientali della tecnologia, suggerendo alla politica come limitarli e renderli un'opportunità
L'articolo I costi ambientali della rivoluzione tecnologica secondo le Nazioni valori.it/costi-ambientali-riv…
reshared this
Only in our dreams are we free. The rest of the time we need wages.
Terry Pratchett, Wyrd Sisters.
Terry non le manda a dire. Ouch!
News da Marte #31: zolfo per Curiosity, composti organici per Perseverance I Coelum Astronomia
"In questo nuovo appuntamento della rubrica ci sono aggiornamenti che interessano i due rover NASA Perseverance e Curiosity. Il primo sta esplorando delle aree a ovest del cratere Jezero e ha scoperto dei materiali di estremo interesse mentre il secondo, in modo decisamente fortuito, ha trovato dei materiali molto particolari all’interno di una roccia."
Macron in Serbia per l’accordo di vendita sui jet militari Rafale
@Notizie dall'Italia e dal mondo
Il presidente francese rimarrà due giorni a Belgrado per discutere con il suo omologo di importanti accordi commerciali, di sicurezza e provare a chiudere la vendita di 12 caccia da guerra
L'articolo Macron in Serbia per l’accordo di vendita sui jet militari Rafale proviene da
Turchia e Qatar insieme per uno squadrone aereo congiunto. I dettagli
[quote]I rapporti securitari tra Qatar, già territorio dell’Impero ottomano dal XVI secolo all’inizio del Novecento, e Turchia sono stretti da anni, ma hanno appena raggiunto una nuova vetta. I due Paesi, infatti, schiereranno uno squadrone aeronavale congiunto basato nella monarchia del Golfo.
PODCAST. Secondo giorno dell’attacco israeliano in Cisgiordania, tra vittime e distruzioni
@Notizie dall'Italia e dal mondo
Dal campo profughi di Tulkarem, circondato e bloccato dai mezzi militari israeliani, Michele Giorgio ci parla dell'operazione militare di Tel Aviv nella West Bank.
L'articolo PODCAST. Secondo giorno dell’attacco israeliano in
La verità sull’arresto politico di Pavel Durov | World Politics Blog
"Dopo i numerosi casi del passato, come quello di Julian Assange, vittima di anni di persecuzione, e dei già citati Edward Snowden – costretto a chiedere la cittadinanza russa – e Meng Wanzhou, l’arresto di Pavel Durov rappresenta l’ennesimo caso di flagrante violazione dei diritti umani da parte delle potenze occidentali, che continuano ad applicare il proprio doppio standard secondo il quale le violazioni sono solo quelle commesse da terzi."
Donald Trump ora si presenta come il paladino delle criptovalute
@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori
Dopo averle criticate per anni, Donald Trump strizza l'occhio al mondo delle criptovalute. Anche lanciando una piattaforma "di famiglia"
L'articolo Donald Trump ora si presenta come il paladino delle criptovalute proviene da Valori.
𝔻𝕚𝕖𝕘𝕠 🦝🧑🏻💻🍕 likes this.
Threads rafforza i suoi legami con il web sociale aperto, noto anche come "fediverso"
Meta ha annunciato che gli utenti di Threads potranno vedere le risposte dal fediverso su altri post oltre al proprio. Inoltre, i post originati tramite l'API di #Threads, come quelli creati tramite app di terze parti e servizi di pianificazione, saranno ora distribuiti al Fediverso
techcrunch.com/2024/08/28/thre…
Threads deepens its ties to the open social web, aka the 'fediverse' | TechCrunch
Meta announced Wednesday that users on Threads will be able to see fediverse replies on other posts besides their own.Sarah Perez (TechCrunch)
like this
reshared this
Il tutto grazie alla ricerca e all’innovazione prodotta dall’mRNA
Si, proprio quello del vaccino anti COVID
Nessuna facile illusione, ma W la ricerca scientifica e W la scienza.
Alla faccia dei disagiati novax 🤣
Veicolo ONU colpito da Israele a Gaza: “sapevano che eravamo noi”
@Notizie dall'Italia e dal mondo
L’automobile, chiaramente contrassegnata dai simboli delle Nazioni Unite, procedeva in un convoglio il cui passaggio era stato coordinato con i militari israeliani
pagineesteri.it/2024/08/28/med…
Caccia russi esportati da New Delhi? Ecco cosa sta succedendo
[quote]Secondo media indiani, la compagnia statale Hindustan aeronautics avrebbe cominciato a intrattenere trattative con la Russia per la produzione congiunta del caccia Su-30, dedito all’export. Lo sviluppo, ancorché ora solo ipotetico, avrebbe importanti implicazioni commerciali per entrambi i Paesi e, ancor più, conseguenze diplomatiche di primaria
Appliance and Tractor Companies Lobby Against Giving the Military the Right to Repair
The U.S. military deals with the same repair monopolies consumers do.Jason Koebler (404 Media)
L’Egitto invia armi alla Somalia, sono le prime dopo 40 anni
@Notizie dall'Italia e dal mondo
Secondo l'agenzia stampa Reuters, martedì 27 agosto due aerei carichi di armi e munizioni sono partiti dal Cairo e atterrati all'aeroporto di Mogadiscio
L'articolo L’Egitto invia armi alla pagineesteri.it/2024/08/28/afr…
Nuova Champions League: il torneo chiuso sognato dai grandi club
@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori
La nuova Champions League, grazie ai soldi che produce e distribuisce, diventerà un torneo chiuso. A partecipare saranno sempre i soliti noti
L'articolo Nuova Champions League: il torneo chiuso sognato dai grandi club proviene da Valori.
Perché è giusto che il Ceo di Starbucks vada al lavoro col jet privato
@Notizie dall'Italia e dal mondo
Il nuovo articolo di @valori
I ricchi ci insegnano come spostarsi felici per andare al lavoro, senza lamentarsi per tempo, costi e inquinamento
L'articolo Perché è giusto che il Ceo di Starbucks vada al lavoro col jet privato proviene da Valori.
reshared this
rag. Gustavino Bevilacqua
in reply to floreana • • •like this
Matteo Zenatti e floreana like this.