👥 Fediverso e Livello Segreto: una palestra di libertà digitale
🕤 Martedì 13 Maggio, ore 21.30 presso Officina Informatica, via Magolo 32 Empoli
Una chiacchierata con @Kenobit , uno dei fondatori di #LivelloSegreto - un'istanza Mastodon - sulle potenzialità del #Fediverso e delle piattaforme libere, in ottica di libertà e resistenza digitale
Grazie a @Giulia Bimbi per la segnalazione
reshared this
Supercon 2024: An Immersive Motion Rehabilitation Device
When you’ve had some kind of injury, rehabilitation can be challenging. You often need to be careful about how you’re using the affected parts of your body, as well as pursue careful exercises for repair and restoration of function. It can be tedious and tiring work, for patients and treating practitioners alike.
Juan Diego Zambrano, Abdelrahman Farag, and Ivan Hernandez have been working on new technology to aid those going through this challenging process. Their talk at the 2024 Hackaday Supercon covers an innovative motion monitoring device intended to aid rehabilitation goals in a medical context.
Motion Project
youtube.com/embed/_5ySbBsYnZg?…
As outlined in the talk, the team took a measured and reasoned approach to developing their device. The project started by defining the problem at hand, before proposing a potential solution. From there, it was a case of selecting the right hardware to do the job, and developing it alongside the necessary software to make it all work.The Arduino Nano BLE33 had most of the necessary functionality for this project, out of the box.
The problem in question regarded helping children through rehabilitative therapies. Structured activities are used to help develop abilities in areas like motor skills, coordination, and balance. These can be particularly challenging for children with physical or developmental difficulties, and can be repetitive at the best of times, leading to a lack of engagement. “We wanted to solve that… we wanted to make it more interactive and more useful for the therapies and for the doctors,” Ivan explains, with an eye to increasing motivation for the individual undergoing rehabilitation.
Other challenges also exist in this arena. Traditional rehabilitation methods offer no real-time feedback to the individual on how they’re performing. There is also a need for manual monitoring and record keeping of the individual’s performance, which can be tedious and often relies on subjective assessments.The device was demonstrated mounted on a patient’s chest, while being used in a game designed for balance work.
Having explored the literature on game-based therapy techniques, the team figured a wearable device with sensors could aid in solving some of these issues. Thus they created their immersive motion rehabilitation device.
At the heart of the build is an Arduino Nano BLE33, so named for its Bluetooth Low Energy wireless communications hardware. Onboard is an nRF52840 microcontroller, which offers both good performance and low power consumption. The real benefit of this platform, though, is that it includes an inertial measurement unit (IMU) and magnetometer on board and ready to go. The IMU in question is the BMI270, which combines a high-precision 3-axis accelerometer and 3-axis gyroscope into a single package. If you want to track motion in three dimensions, this is a great way to do it.
For user feedback, some additional hardware was needed. The team added a vibration motor, RGB LED, and buzzer for this reason. Controlling the device is simple, with the buttons on board. In order to make the device easy to use for therapists, it’s paired with a Windows application, programmed in C#. It’s used for monitoring and analysis of the wearer’s performance during regular rehabilitation activities.The user’s motions are recorded while playing a simple game, providing useful clinical data.
The talk explains how this simple, off-the-shelf hardware was used to aid the rehabilitation experience. By gamifying things, users are prompted to better engage with the therapy process by completing tasks monitored by the device’s sensors. Fun graphics and simple gameplay ideas are used to make a boring exercise into something more palatable to children going through rehabilitation.
The team go on to explain the benefits on the clinical side of things, regarding how data collection and real time monitoring can aid in delivery. The project also involved the creation of a system for generating reports and accessing patient data to support this work, as well as a fun connection assistant called Sharky.
Overall, the talk serves as a useful insight as to how commonly-available hardware can be transformed into useful clinical tools. Indeed, it’s not so different from the gamification we see all the time in the exercise space, where smartwatches and apps are used to increase motivation and provide data for analysis. Ultimately, with a project like this, if you can motivate a patient to pursue their rehabilitation goals while collecting data at the same time, that’s useful in more ways than one.
Spazio e Gcap. Ecco tutte le sfide per il gen. Conserva, nuovo capo dell’Aeronautica
@Notizie dall'Italia e dal mondo
Il nuovo capo di Stato maggiore dell’Aeronautica militare è il generale Antonio Conserva, che subentra al posto del generale Luca Goretti. Lo ha deciso oggi il Consiglio dei ministri presieduto da Giorgia Meloni, che ha accolto la proposta del ministro della Difesa, Guido
Notizie dall'Italia e dal mondo reshared this.
Hackaday Podcast Episode 320: A Lot of Cool 3D Printing, DIY Penicillin, and an Optical Twofer
This week, Hackaday’s Elliot Williams and Kristina Panos met up across the universe to bring you the latest news, mystery sound, and of course, a big bunch of hacks from the previous week.
In Hackaday news, the 2025 Pet Hacks Contest rolls on. You have until June 10th to show us what you’ve got, so head over to Hackaday.IO and get started today!
On What’s That Sound, Kristina actually got it this time, although she couldn’t quite muster the correct name for it, however at Hackaday we’ll be calling it the “glassophone” from now on. Congratulations to [disaster_recovered] who fared better and wins a limited edition Hackaday Podcast t-shirt!
After that, it’s on to the hacks and such, beginning with a complete and completely-documented wireless USB autopsy. We take a look at a lovely 3D-printed downspout, some DIY penicillin, and a jellybean iMac that’s hiding a modern PC. Finally, we explore a really cool 3D printing technology, and ask what happened to typing ‘www.’.
Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!
html5-player.libsyn.com/embed/…
Download in DRM-free MP3 and savor at your leisure.
Where to Follow Hackaday Podcast
Places to follow Hackaday podcasts:
Episode 320 Show Notes:
News:
What’s that Sound?
- Congratulations to [disaster_recovered] for the glass armonica pick!
Interesting Hacks of the Week:
- Wireless USB Autopsy
- 3D Printed Downspout Makes Life Just A Little Nicer
- DIY Penicillin
- Jellybean Mac Hides Modern PC
- Liquid Silicone 3D Printing Is No Joke
- Creative PCB Business Cards Are Sure To Make An Impression
Quick Hacks:
- Elliot’s Picks:
- 3D Printed TPU Bellows With PLA Interface Layers
- Germany’s Cabinentaxi: The Double-Sided Monorail That Wasn’t Meant To Be
- PCB Renewal Aims To Make Old Boards Useful Again
- Kristina’s Picks:
- A Neat E-Paper Digit Clock (or Four)
- All-Band Radio Records Signals, Plays MP3s
- 3D Printed Spirograph Makes Art Out Of Walnut
Can’t-Miss Articles:
- Optical Contact Bonding: Where The Macro Meets The Molecular
- Flow Visualization With Schlieren Photography
- What Happened To WWW.?
hackaday.com/2025/05/09/hackad…
Meta previously lost its shit at 404 Media when we reported that someone had paired facial recognition tech with the company's smart glasses. Now Meta is building the invasive technology itself.
Meta previously lost its shit at 404 Media when we reported that someone had paired facial recognition tech with the companyx27;s smart glasses. Now Meta is building the invasive technology itself.#News
Well, Well, Well: Meta to Add Facial Recognition To Glasses After All
Meta previously lost its shit at 404 Media when we reported that someone had paired facial recognition tech with the company's smart glasses. Now Meta is building the invasive technology itself.Joseph Cox (404 Media)
Oscilloscope Digital Storage, 1990s Style
You’re designing an oscilloscope with modest storage — only 15,000 samples per channel. However, the sample rate is at 5 Gs/s, and you have to store all four channels at that speed and depth. While there is a bit of a challenge implied, this is quite doable using today’s technology. But what about in the 1990s when the Tektronix TDS 684B appeared on the market? [Tom Verbure] wondered how it was able to do such a thing. He found out, and since he wrote it up, now you can find out, too.
Inside the scope, there are two PCBs. There’s a CPU board, of course. But there’s not enough memory there to account for the scope’s capability. That much high-speed memory would have been tough in those days, anyway. The memory is actually on the analog board along with the inputs and digitizers. That should be a clue.
The secret is the ADG286D from National Semiconductor. While we can’t find any info on the chip, it appears to be an analog shift register, something all the rage at the time. These chips often appeared in audio special effect units because they could delay an analog signal easily.
In practice, the device worked by charging a capacitor to an input signal and then, using a clock, dumping each capacitor into the next one until the last capacitor produced the delayed output. Like any delay line, you could feed the output to the input and have a working memory device.
The scope would push samples into the memory at high speed. Then the CPU could shift them back out on a much slower clock. A clever design and [Tom] gives us a great glimpse inside a state-of-the-art 1990s-era scope.
While we haven’t seen the ADG286D before, we have looked at analog shift registers, if you want to learn more.
This Week in Security: Encrypted Messaging, NSO’s Judgement, and AI CVE DDoS
Cryptographic messaging has been in the news a lot recently. Like the formal audit of WhatsApp (the actual PDF). And the results are good. There are some minor potential problems that the audit highlights, but they are of questionable real-world impact. The most consequential is how easy it is to add additional members to a group chat. Or to put it another way, there are no cryptographic guarantees associated with adding a new user to a group.
The good news is that WhatsApp groups don’t allow new members to read previous messages. So a user getting added to a group doesn’t reveal historic messages. But a user added without being noticed can snoop on future messages. There’s an obvious question, as to how this is a weakness. Isn’t it redundant, since anyone with the permission to add someone to a group, can already read the messages from that group?
That’s where the lack of cryptography comes in. To put it simply, the WhatsApp servers could add users to groups, even if none of the existing users actually requested the addition. It’s not a vulnerability per se, but definitely a design choice to keep in mind. Keep an eye on the members in your groups, just in case.
The Signal We Have at Home
The TeleMessage app has been pulled from availability, after it was used to compromise Signal communications of US government officials. There’s political hay to be made out of the current administration’s use and potential misuse of Signal, but the political angle isn’t what we’re here for. The TeleMessage client is Signal compatible, but adds message archiving features. Government officials and financial companies were using this alternative client, likely in order to comply with message retention laws.
While it’s possible to do long term message retention securely, TeleMessage was not doing this particularly well. The messages are stripped of their end-to-end encryption in the client, before being sent to the archiving server. It’s not clear exactly how, but those messages were accessed by a hacker. This nicely demonstrates the inherent tension between the need for transparent archiving as required by the US government for internal communications, and the need for end-to-end encryption.
The NSO Judgement
WhatsApp is in the news for another reason, this time winning a legal judgement against NSO Group for their Pegasus spyware. The $167 Million in damages casts real doubt on the idea that NSO has immunity to develop and deploy malware, simply because it’s doing so for governments. This case is likely to be appealed, and higher courts may have a different opinion on this key legal question, so hold on. Regardless, the era of NSO’s nearly unrestricted actions is probably over. They aren’t the only group operating in this grey legal space, and the other “legal” spyware/malware vendors are sure to be paying attention to this ruling as well.
The $5 Wrench
In reality, the weak point of any cryptography scheme is the humans using it. We’re beginning to see real world re-enactments of the famous XKCD $5 wrench, that can defeat even 4096-bit RSA encryption. In this case, it’s the application of old crime techniques to new technology like cryptocurrency. To quote Ars Technica:
We have reached the “severed fingers and abductions” stage of the crypto revolution
The flashy stories involve kidnapping and torture, but let’s not forget that the most common low-tech approach is simple deception. Whether you call it the art of the con, or social engineering, this is still the most likely way to lose your savings, whether it’s conventional or a cryptocurrency.
The SonicWall N-day
WatchTowr is back with yet another reverse-engineered vulnerability. More precisely, it’s two CVEs that are being chained together to achieve pre-auth Remote Code Execution (RCE) on SonicWall appliances. This exploit chain has been patched, but not everyone has updated, and the vulnerabilities are being exploited in the wild.
The first vulnerability at play is actually from last year, and is in Apache’s mod_rewrite
module. This module is widely used to map URLs to source files, and it has a filename confusion issue where a url-encoded question mark in the path can break the mapping to the final filesystem path. A second issue is that when DocumentRoot
is specified, instances of RewriteRule
take on a weird dual-meaning. The filesystem target refers to the location inside DocumentRoot
, but it first checks for that location in the filesystem root itself. This was fixed in Apache nearly a year ago, but it takes time for patches to roll out.
SonicWall was using a rewrite rule to serve CSS files, and the regex used to match those files is just flexible enough to be abused for arbitrary file read. /mnt/ram/var/log/httpd.log%3f.1.1.1.1a-1.css
matches that rule, but includes the url-encoded question mark, and matches a location on the root filesystem. There are other, more interesting files to access, like the temp.db
SQLite database, which contains session keys for the currently logged in users.
The other half of this attack is a really clever command injection using one of the diagnostic tools included in the SonicWall interface. Traceroute6
is straightforward, running a traceroute6 command and returning the results. It’s also got good data sanitization, blocking all of the easy ways to break out of the traceroute
command and execute some arbitrary code. The weakness is that while this sanitization adds backslashes to escape quotes and other special symbols, it stores the result in a fixed-length result buffer. If the result of this escaping process overflows the result buffer, it writes over the null terminator and into the buffer that holds the original command before it’s sanitized. This overflow is repeated when the command is run, and with some careful crafting, this results in escaping the sanitization and including arbitrary commands. Clever.
The AI CVE DDoS
[Daniel Stenberg], lead developer of curl, is putting his foot down. We’ve talked about this before, even chatting with Daniel about the issue when we had him on FLOSS Weekly. Curl’s bug bounty project has attracted quite a few ambitious people, that don’t actually have the skills to find vulnerabilities in the curl codebase. Instead, these amateur security researchers are using LLMs to “find vulnerabilities”. Spoiler, LLMs aren’t yet capable of this task. But LLMs are capable of writing fake vulnerability reports that look very convincing at first read. The game is usually revealed when the project asks a question, and the fake researcher feeds the LLM response back into the bug report.
This trend hasn’t slowed, and the curl project is now viewing the AI generated vulnerability reports as a form of DDoS. In response, the curl Hackerone bounty program will soon ask a question with every entry: “Did you use an AI to find the problem or generate this submission?” An affirmative answer won’t automatically disqualify the report, but it definitely puts the burden on the reporter to demonstrate that the flaw is real and wasn’t hallucinated. Additionally, “AI slop” reports will result in permanent bans for the reporter.
It’s good to see that not all AI content is completely disallowed, as it’s very likely that LLMs will be involved in finding and describing vulnerabilities before long. Just not in this naive way, where a single prompt results in a vulnerability find and generates a patch that doesn’t even apply. Ironically, one of the tells of an AI generated report is that it’s too perfect, particularly for someone’s first report. AI is still the hot new thing, so this issue likely isn’t going away any time soon.
Bits and Bytes
A supply chain attack has been triggered against several hundred Magento e-commerce sites, via at least three software vendors distributing malicious code. One of the very odd elements to this story is that it appears this malicious code has been incubating for six years, and only recently invoked for malicious behavior.
On the WordPress side of the fence, the Ottokit plugin was updated last month to fix a critical vulnerability. That update was force pushed to the majority of WordPress sites running that plugin, but that hasn’t stopped threat actors from attempting to use the exploit, with the first attempts coming just an hour and a half after disclosure.
It turns out it’s probably not a great idea to allow control codes as part of file names. Portswigger has a report of a couple ways VS Code can do the wrong thing with such filenames.
And finally, this story comes with a disclaimer: Your author is part of Meshtastic Solutions and the Meshtastic project. We’ve talked about Meshtastic a few times here on Hackaday, and would be remiss not to point out CVE-2025-24797. This buffer overflow could theoretically result in RCE on the node itself. I’ve seen at least one suggestion that this is a wormable vulnerability, which may be technically true, but seems quite impractical in practice. Upgrade your nodes to at least release 2.6.2 to get the fix.
Saltzman apre all’Italia. Insieme dobbiamo avere un posto al tavolo dell’aerospazio
@Notizie dall'Italia e dal mondo
Buongiorno, non so se riuscirò a essere all’altezza di questa introduzione, è un vero piacere essere con voi all’Aerospace Power Conference per la seconda volta. Spesso la seconda volta è più difficile, perché devi ripetere il successo della prima, ma non
Notizie dall'Italia e dal mondo reshared this.
Chi è l’ammiraglio Ottaviani, alla guida della Direzione nazionale armamenti
@Notizie dall'Italia e dal mondo
Alla guida della Direzione nazionale degli armamenti arriva l’ammiraglio Giacinto Ottaviani, che lascerà il posto di sottocapo di Stato maggiore della Difesa. Lo ha deciso il Consiglio dei ministri su proposta del ministro della Difesa, Guido Crosetto, che ha così
Notizie dall'Italia e dal mondo reshared this.
Anti-ransomware Day 2025: come mitigare gli attacchi non convenzionali e con l’AI
@Informatica (Italy e non Italy 😁)
Secondo il report "State of Ransomware Report 2025", ci si attende un'evoluzione della minaccia, pronta a sfruttare vulnerabilità in accessi trascurati e poco presidiati, come webcam e dispositivi IoT. Ecco le tendenze
Informatica (Italy e non Italy 😁) reshared this.
misunderstandings (a theory of photography) / mel bochner. 1970
Poliversity - Università ricerca e giornalismo reshared this.
STATI UNITI. L’esercito espelle i soldati transgender
@Notizie dall'Italia e dal mondo
Con un nuovo ordine del Pentagono e l'avallo della Corte Suprema, migliaia di soldati vengono esclusi dalle forze armate per il solo fatto di essere transgender: una svolta che riaccende l'allarme sui diritti civili negli Stati Uniti.
L'articolo STATI UNITI. L’esercito espelle i soldati transgender
Notizie dall'Italia e dal mondo reshared this.
freezonemagazine.com/articoli/…
Uccidere il gatto sarebbe stato un errore, in generale e in particolare. L’ho pensato quando mi hai spiegato cosa intendevi farne del cadavere. Era aprile, ci eravamo trasferiti già da sei mesi. Le case appena costruite risplendevano sotto il sole umido di rugiada, i pannelli solari scintillavano sui tetti e il prato cresceva fitto ai […]
L'articolo Julia Deck – Proprietà privata proviene da
Ministero dell'Istruzione
Oggi è il Giorno della memoria dedicato alle vittime del terrorismo interno e internazionale e delle stragi di tale matrice, istituito nel 2007 e celebrato ogni anno il #9maggio, giorno dell’uccisione di Aldo Moro e di Peppino Impastato.Telegram
India-Pakistan: accuse reciproche di attacchi lungo il confine
@Notizie dall'Italia e dal mondo
Escalation militare dopo raid indiani in Kashmir: droni, artiglieria e vittime civili lungo la Linea di Controllo.
L'articolo India-Pakistan: accuse reciproche di attacchi lungo il confine proviene da pagineesteri.it/2025/05/09/asi…
Notizie dall'Italia e dal mondo reshared this.
L’Italia può contare (e pesare) nel futuro dell’Indo-Pacifico. La riflessione di Volpi
@Notizie dall'Italia e dal mondo
Indo-Pacifico. Da qualche anno è questa la parola chiave di ogni agenda strategica, il cuore di ogni esercitazione militare rilevante, il baricentro di ogni riflessione geopolitica con ambizione globale. Ma non si tratta solo di un concetto geografico allargato: è lo specchio dell’era multipolare che
Notizie dall'Italia e dal mondo reshared this.
Bill Gates donerà 200 miliardi di dollari alla sua fondazione di beneficenza
La cifra che metterà a disposizione è pari al 99 per cento del suo patrimonio
Gates, che ha 69 anni, ha motivato il cambio di programmi dicendo che il mondo si trova ad affrontare molti problemi urgenti e che lui vuole finanziare, e incoraggiare altri a farlo, nuovi strumenti per cercare di risolverli: «Ci sono troppi problemi urgenti da risolvere perché io trattenga risorse che potrebbero essere usate per aiutare le persone»
Gates ha indicato tre priorità della sua fondazione per il futuro: la mortalità infantile, le malattie infettive, principalmente poliomielite, morbillo e malaria, e iniziative legate all’istruzione
In un’intervista al Financial Times Gates ha esplicitamente attaccato Musk dicendo che «non è una bella immagine quella dell’uomo più ricco del mondo che sta uccidendo i bambini più poveri del mondo», spiegando che lo smantellamento di USAID potrebbe portare a una nuova ondata di morti e che va «ben oltre qualsiasi eliminazione degli sprechi»
Miracolo papale papale di Starlink in Vaticano. Che diavolo succede?
L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Starlink aggira le regole Agcom e conquista San Pietro: disparità di trattamento evidente. La lettera di Luigi Pereira.
like this
reshared this
Di cosa si è discusso al Consiglio supremo di Difesa. Tutti i dettagli
@Notizie dall'Italia e dal mondo
Si è concluso il Consiglio supremo di Difesa, convocato dal presidente della Repubblica, Sergio Mattarella la scorsa settimana. Il massimo organo costituzionale responsabile per la sicurezza nazionale si è riunito per esaminare i più recenti sviluppi sullo scacchiere
Notizie dall'Italia e dal mondo reshared this.
Pëtr Arkad'evič Stolypin likes this.
MASAFER YATTA. Le ruspe israeliane cancellano Khalet El Dabaa, 100 palestinesi in strada
@Notizie dall'Italia e dal mondo
Distrutte 9 case, 6 grotte abitate, 10 cisterne d'acqua, 4 stalle, una cabina elettrica, l'impianto solare e il centro comunitario. Restano in piedi solo 3 strutture e la scuola
L'articolo MASAFER YATTA. Le ruspe israeliane
Notizie dall'Italia e dal mondo reshared this.
freezonemagazine.com/articoli/…
Il potere della musica. Potere della musica, potere della parola ritmata dalla musica. Potere demonico, maieutico, che può essere, allo stesso tempo, violento e consolatorio, spaventoso e accogliente. Nella musica, i contrasti sembrano talvolta ricomporsi e la verità, le nostra verità, offrirsi in un breve lampo di illuminazione: si accende, e subito, non appena l’eco […]
L'articolo Nuvole, sogni
Il
Wow, un altro sistema proprietario!
Ne sentivamo il bisogno, vero? Mi chiedo perché non esista una big tech che investa seriamente su Linux, che come in questo caso avrebbe potuto essere un'alternativa già pronta (e soprattutto appetibile) a Windows.
Ah, già...il controllo! Dimenticavo.
Cosa ne pensate?
Già! Se le aziende statunitensi sono ben lontane da un paradigma più etico, figuriamoci poi una big tech cinese quanto può avere a cuore la democrazia!
“Tech e Privacy”, la newsletter di Claudia Giulia, è online!
Tecnologia, geopolitica e società si intrecciano sempre di più.
Questa settimana parliamo della supremazia della Cina, dei problemi di Tesla, e poi NVIDIA e DOGE.
La NL è uscita eccezionalmente oggi, e non perderla
reshared this
Watch an AI-Generated Recruiter Make a Job Interview Even Worse
“Vertical bar pilates."Samantha Cole (404 Media)
Un recente studio sulle modalità di comunicare informazioni sul cambiamento climatico, mostra come rendere più incisivo il messaggio: con visualizzazioni binarie dei dati invece che tramite dati continui.
Binary climate data visuals amplify perceived impact of climate change
Grace Liu, Jake C. Snell, …Rachit Dubey
Nature Human Behaviour (2025)
nature.com/articles/s41562-025…
Le visualizzazioni binarie dei dati climatici amplificano l'impatto percepito del cambiamento climatico
Per gran parte della popolazione mondiale, il cambiamento climatico appare come un lento e graduale cambiamento del tempo quotidiano.
Questo porta molti a percepire i suoi impatti come minori e a generare apatia (l'effetto "rana bollita"). Come possiamo trasmettere l'urgenza della crisi quando i suoi impatti appaiono così sottili?
Attraverso una serie di esperimenti cognitivi su larga scala (N = 799), abbiamo scoperto che presentare alle persone dati climatici binari (ad esempio, le immagini sulle differenze nelle date del congelamento dei laghi) aumenta significativamente l'impatto percepito del cambiamento climatico rispetto a fornire dei dati continui (ad esempio, la temperatura media).
...i dati binari aumentano l'impatto percepito, creando una "illusione" di cambiamenti improvvisi.
...
Questi risultati, replicati in modo robusto in più esperimenti, forniscono una base cognitiva per l'effetto "rana bollita" e offrono un approccio basato sulla psicologia ai politici e agli educatori per migliorare la comunicazione sui cambiamenti climatici, mantenendo l'accuratezza scientifica.
Perché infangare i verminai, paragonandoli alle cose che avvengono nel, vicino, intorno al Porto di Genova?
E meno male che ci sono ancora validi giornalisti a scoperchiarlo.
Un recente articolo su Nature cambiamento climatico esplora le diseguaglianze di emissione di gas serra derivati dai più ricchi
I gruppi ad alto reddito contribuiscono in modo sproporzionato agli estremi climatici in tutto il mondo
High-income groups disproportionately contribute to climate extremes worldwide
Sarah Schöngart, Zebedee Nicholls, …Carl-Friedrich Schleussner
Nature Climate Change (2025)
www.nature.com/articles/s41558-025-02325-x
L'ingiustizia climatica persiste e i meno responsabili spesso sopportano i maggiori impatti, sia tra i paesi che tra i singoli all'interno dei paesi.
Qui mostriamo come le emissioni da gas serra, attribuibili ai consumi e agli investimenti dei gruppi di popolazione più ricchi, hanno influenzato in modo sproporzionato gli attuali cambiamenti climatici.
Colleghiamo la disuguaglianza delle emissioni nel periodo 1990-2020 a estremi climatici regionali... due terzi cioè 66% del riscaldamento sono attribuibili al 10% più ricco nella popolazione (ben un quinto, cioè il 20%, è attribuibile all' 1% più ricco), il che significa che la responsabilità dei contributi individuali è 6,5 volte quella dei contributi pro capite medi (addirittura è di 20 volte per i più ricchi).
Quantificare il collegamento tra le disparità di ricchezza e gli impatti climatici può aiutare nel discorso sull'equità e la giustizia climatica.
👆🏻La toccano piano ma leggendo, ben tra le righe del testo dell' articolo, suggeriscono una tassazione globale internazionale, allineata ai consumi e alla finanza transfrontaliera. 🤯
👏🏻👏🏻👏🏻
marcolo reshared this.
SelfWelcome to Friendica!
Eccomi qui, già utente di livellosegreto.it a cui mancano i ''gruppi'' come nel social blu quindi...ci si prova!
Perennemente interessato alla ricerca di arte in tutte le sue forme che essa sia sonora, visiva od intellettuale.
Ora e sempre viva l'ozio, la voglia di ragionare e di crescere ed il divano (lo so, è collegato all'ozio ma volevo rimarcare il concetto) ♥
Signor Amministratore ⁂ likes this.
Ciao @depand456 e benvenuto!
Se vuoi sapere cosa succede qui, puoi iniziare da
1) Questo link poliverso.org/community che ti mostra i contenuti prodotti dagli utenti del solo server Poliverso
2) Questo link poliverso.org/community/global che ti mostra i contenuti prodotti dagli utenti di server diversi da Poliverso3) Questo link poliverso.org/network dove vedrai gli aggiornamenti dei tuoi contatti; e se anche non hai ancora contatti (e quindi non vedrai nulla nella pagina principale), puoi dare un'occhiata ai link a sinistra, dove troverai un filtro sui contenuti, in base alla tua lingua, gli ultimi contenuti pubblicati oppure tag come #Art #Socialmedia e #USA.
4) Questo link poliverso.org/calendar che ti mostra gli eventi federati condivisi da persone del tuo server o dai contatti dei tuoi contatti
Infine ti do il link di un promemoria utile per i nuovi utenti Friendica (ma anche per quelli meno nuovi)
depand456 likes this.
Signor Amministratore ⁂ likes this.
Prevost: la scheda redatta dalle persone sopravvissute ad abusi
Ecco la pagina che la rete delle persone sopravvissute ad abusi nella chiesa cattolica, in sigla SNAP, dedicava prima dell'elezione a Prevost . Se clicchiamo sul bottone rosso "Read Vos Estis report", ecco il carteggio della SNAP inviato in vaticano, perchè anche a Prevost fosse applicata la legge istituita da Bergoglio sugli abusi. Si legge di un caso di abusatore con 13 vittime conclamate non protette nell'Illinois, e di sentenze della giustizia civile peruviana che scrivono nero su bianco dell'inazione della diocesi guidata da Prevost nel contrastare altri casi di abusi su almeno tre persone. Peccato che lo stesso Bergoglio prenda un infrattore della legge da lui istituita, e lo metta - con potere crescente - in un ruolo chiave per la nomina di vescovi.
"Tutto apposto".
- -
As provincial of the Augustinians, Prevost allowed Father James Ray, a priest then accused of abusing minors whose ministry had been restricted since 1991, to reside at the Augustinians' St. John Stone Friary in Chicago in 2000, despite its proximity to a Catholic elementary school. When Prevost was Bishop of Chiclayo, three victims reported to civil authorities in 2022 after there was no movement on their canonical case filed through the diocese. Victims have since claimed Prevost failed to open an investigation, sent inadequate information to Rome, and that the diocese allowed the priest to continue saying mass.SNAP filed a complaint against Prevost under the pope’s 2023 decree Vos estis lux mundi on March 25, 2025
Vos estis lux mundi, Pope Francis’ 2023 decree, allows any bishop, cardinal, or religious superior to be reported and investigated for abuse or cover-up. These complaints, submitted to the Vatican, are not verdicts of guilt. They are evidence-based calls for investigation—each meeting the church’s own standard of “serious indications” that a violation occurred. In civil terms, this is equivalent to probable cause or reasonable grounds to investigate.
Every filing draws from a solid foundation of survivor and eyewitness testimony, public records and church statements, independent investigations by media and legal experts, official church documents and canonical proceedings, testimony, depositions, and court-ordered documents from criminal and civil cases.
È in missione per conto di Dio!
È di Chicago, Illinois, come Jake ed Elwood!
Io come nome avrei scelto Blues I.
Papa Blues I... suona bene.
eutampieri
in reply to Informa Pirata • • •Eugenio
in reply to Informa Pirata • • •