Salta al contenuto principale



E il papa nuovo comincia subito insinuando che gli atei siano privi di etica e morale.
Mi chiedo chi frequenti…


👥 Fediverso e Livello Segreto: una palestra di libertà digitale

🕤 Martedì 13 Maggio, ore 21.30 presso Officina Informatica, via Magolo 32 Empoli

Una chiacchierata con @Kenobit , uno dei fondatori di #LivelloSegreto - un'istanza Mastodon - sulle potenzialità del #Fediverso e delle piattaforme libere, in ottica di libertà e resistenza digitale

Grazie a @Giulia Bimbi per la segnalazione

@Che succede nel Fediverso?



Supercon 2024: An Immersive Motion Rehabilitation Device


When you’ve had some kind of injury, rehabilitation can be challenging. You often need to be careful about how you’re using the affected parts of your body, as well as pursue careful exercises for repair and restoration of function. It can be tedious and tiring work, for patients and treating practitioners alike.

Juan Diego Zambrano, Abdelrahman Farag, and Ivan Hernandez have been working on new technology to aid those going through this challenging process. Their talk at the 2024 Hackaday Supercon covers an innovative motion monitoring device intended to aid rehabilitation goals in a medical context.

Motion Project


youtube.com/embed/_5ySbBsYnZg?…

As outlined in the talk, the team took a measured and reasoned approach to developing their device. The project started by defining the problem at hand, before proposing a potential solution. From there, it was a case of selecting the right hardware to do the job, and developing it alongside the necessary software to make it all work.
The Arduino Nano BLE33 had most of the necessary functionality for this project, out of the box.
The problem in question regarded helping children through rehabilitative therapies. Structured activities are used to help develop abilities in areas like motor skills, coordination, and balance. These can be particularly challenging for children with physical or developmental difficulties, and can be repetitive at the best of times, leading to a lack of engagement. “We wanted to solve that… we wanted to make it more interactive and more useful for the therapies and for the doctors,” Ivan explains, with an eye to increasing motivation for the individual undergoing rehabilitation.

Other challenges also exist in this arena. Traditional rehabilitation methods offer no real-time feedback to the individual on how they’re performing. There is also a need for manual monitoring and record keeping of the individual’s performance, which can be tedious and often relies on subjective assessments.
The device was demonstrated mounted on a patient’s chest, while being used in a game designed for balance work.
Having explored the literature on game-based therapy techniques, the team figured a wearable device with sensors could aid in solving some of these issues. Thus they created their immersive motion rehabilitation device.

At the heart of the build is an Arduino Nano BLE33, so named for its Bluetooth Low Energy wireless communications hardware. Onboard is an nRF52840 microcontroller, which offers both good performance and low power consumption. The real benefit of this platform, though, is that it includes an inertial measurement unit (IMU) and magnetometer on board and ready to go. The IMU in question is the BMI270, which combines a high-precision 3-axis accelerometer and 3-axis gyroscope into a single package. If you want to track motion in three dimensions, this is a great way to do it.

For user feedback, some additional hardware was needed. The team added a vibration motor, RGB LED, and buzzer for this reason. Controlling the device is simple, with the buttons on board. In order to make the device easy to use for therapists, it’s paired with a Windows application, programmed in C#. It’s used for monitoring and analysis of the wearer’s performance during regular rehabilitation activities.
The user’s motions are recorded while playing a simple game, providing useful clinical data.
The talk explains how this simple, off-the-shelf hardware was used to aid the rehabilitation experience. By gamifying things, users are prompted to better engage with the therapy process by completing tasks monitored by the device’s sensors. Fun graphics and simple gameplay ideas are used to make a boring exercise into something more palatable to children going through rehabilitation.

The team go on to explain the benefits on the clinical side of things, regarding how data collection and real time monitoring can aid in delivery. The project also involved the creation of a system for generating reports and accessing patient data to support this work, as well as a fun connection assistant called Sharky.

Overall, the talk serves as a useful insight as to how commonly-available hardware can be transformed into useful clinical tools. Indeed, it’s not so different from the gamification we see all the time in the exercise space, where smartwatches and apps are used to increase motivation and provide data for analysis. Ultimately, with a project like this, if you can motivate a patient to pursue their rehabilitation goals while collecting data at the same time, that’s useful in more ways than one.


hackaday.com/2025/05/09/superc…



This week, we discuss the death of Mr. Deepfakes, introducing kids to the Manosphere, and working on big, difficult, high-brain-power scoops.#BehindTheBlog


Ricardo Prada Vásquez was not on a government list of people sent to a mega prison in El Salvador. But hacked data shows he was booked on a flight to the country.#News
#News


Spazio e Gcap. Ecco tutte le sfide per il gen. Conserva, nuovo capo dell’Aeronautica

@Notizie dall'Italia e dal mondo

Il nuovo capo di Stato maggiore dell’Aeronautica militare è il generale Antonio Conserva, che subentra al posto del generale Luca Goretti. Lo ha deciso oggi il Consiglio dei ministri presieduto da Giorgia Meloni, che ha accolto la proposta del ministro della Difesa, Guido



Hackaday Podcast Episode 320: A Lot of Cool 3D Printing, DIY Penicillin, and an Optical Twofer


This week, Hackaday’s Elliot Williams and Kristina Panos met up across the universe to bring you the latest news, mystery sound, and of course, a big bunch of hacks from the previous week.

In Hackaday news, the 2025 Pet Hacks Contest rolls on. You have until June 10th to show us what you’ve got, so head over to Hackaday.IO and get started today!

On What’s That Sound, Kristina actually got it this time, although she couldn’t quite muster the correct name for it, however at Hackaday we’ll be calling it the “glassophone” from now on. Congratulations to [disaster_recovered] who fared better and wins a limited edition Hackaday Podcast t-shirt!

After that, it’s on to the hacks and such, beginning with a complete and completely-documented wireless USB autopsy. We take a look at a lovely 3D-printed downspout, some DIY penicillin, and a jellybean iMac that’s hiding a modern PC. Finally, we explore a really cool 3D printing technology, and ask what happened to typing ‘www.’.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

html5-player.libsyn.com/embed/…

Download in DRM-free MP3 and savor at your leisure.

Where to Follow Hackaday Podcast

Places to follow Hackaday podcasts:



Episode 320 Show Notes:

News:



What’s that Sound?


  • Congratulations to [disaster_recovered] for the glass armonica pick!


Interesting Hacks of the Week:



Quick Hacks:



Can’t-Miss Articles:



hackaday.com/2025/05/09/hackad…



Meta previously lost its shit at 404 Media when we reported that someone had paired facial recognition tech with the company's smart glasses. Now Meta is building the invasive technology itself.

Meta previously lost its shit at 404 Media when we reported that someone had paired facial recognition tech with the companyx27;s smart glasses. Now Meta is building the invasive technology itself.#News

#News #x27


Oscilloscope Digital Storage, 1990s Style


You’re designing an oscilloscope with modest storage — only 15,000 samples per channel. However, the sample rate is at 5 Gs/s, and you have to store all four channels at that speed and depth. While there is a bit of a challenge implied, this is quite doable using today’s technology. But what about in the 1990s when the Tektronix TDS 684B appeared on the market? [Tom Verbure] wondered how it was able to do such a thing. He found out, and since he wrote it up, now you can find out, too.

Inside the scope, there are two PCBs. There’s a CPU board, of course. But there’s not enough memory there to account for the scope’s capability. That much high-speed memory would have been tough in those days, anyway. The memory is actually on the analog board along with the inputs and digitizers. That should be a clue.

The secret is the ADG286D from National Semiconductor. While we can’t find any info on the chip, it appears to be an analog shift register, something all the rage at the time. These chips often appeared in audio special effect units because they could delay an analog signal easily.

In practice, the device worked by charging a capacitor to an input signal and then, using a clock, dumping each capacitor into the next one until the last capacitor produced the delayed output. Like any delay line, you could feed the output to the input and have a working memory device.

The scope would push samples into the memory at high speed. Then the CPU could shift them back out on a much slower clock. A clever design and [Tom] gives us a great glimpse inside a state-of-the-art 1990s-era scope.

While we haven’t seen the ADG286D before, we have looked at analog shift registers, if you want to learn more.


hackaday.com/2025/05/09/oscill…



This Week in Security: Encrypted Messaging, NSO’s Judgement, and AI CVE DDoS


Cryptographic messaging has been in the news a lot recently. Like the formal audit of WhatsApp (the actual PDF). And the results are good. There are some minor potential problems that the audit highlights, but they are of questionable real-world impact. The most consequential is how easy it is to add additional members to a group chat. Or to put it another way, there are no cryptographic guarantees associated with adding a new user to a group.

The good news is that WhatsApp groups don’t allow new members to read previous messages. So a user getting added to a group doesn’t reveal historic messages. But a user added without being noticed can snoop on future messages. There’s an obvious question, as to how this is a weakness. Isn’t it redundant, since anyone with the permission to add someone to a group, can already read the messages from that group?

That’s where the lack of cryptography comes in. To put it simply, the WhatsApp servers could add users to groups, even if none of the existing users actually requested the addition. It’s not a vulnerability per se, but definitely a design choice to keep in mind. Keep an eye on the members in your groups, just in case.

The Signal We Have at Home


The TeleMessage app has been pulled from availability, after it was used to compromise Signal communications of US government officials. There’s political hay to be made out of the current administration’s use and potential misuse of Signal, but the political angle isn’t what we’re here for. The TeleMessage client is Signal compatible, but adds message archiving features. Government officials and financial companies were using this alternative client, likely in order to comply with message retention laws.

While it’s possible to do long term message retention securely, TeleMessage was not doing this particularly well. The messages are stripped of their end-to-end encryption in the client, before being sent to the archiving server. It’s not clear exactly how, but those messages were accessed by a hacker. This nicely demonstrates the inherent tension between the need for transparent archiving as required by the US government for internal communications, and the need for end-to-end encryption.

The NSO Judgement


WhatsApp is in the news for another reason, this time winning a legal judgement against NSO Group for their Pegasus spyware. The $167 Million in damages casts real doubt on the idea that NSO has immunity to develop and deploy malware, simply because it’s doing so for governments. This case is likely to be appealed, and higher courts may have a different opinion on this key legal question, so hold on. Regardless, the era of NSO’s nearly unrestricted actions is probably over. They aren’t the only group operating in this grey legal space, and the other “legal” spyware/malware vendors are sure to be paying attention to this ruling as well.

The $5 Wrench


In reality, the weak point of any cryptography scheme is the humans using it. We’re beginning to see real world re-enactments of the famous XKCD $5 wrench, that can defeat even 4096-bit RSA encryption. In this case, it’s the application of old crime techniques to new technology like cryptocurrency. To quote Ars Technica:

We have reached the “severed fingers and abductions” stage of the crypto revolution


The flashy stories involve kidnapping and torture, but let’s not forget that the most common low-tech approach is simple deception. Whether you call it the art of the con, or social engineering, this is still the most likely way to lose your savings, whether it’s conventional or a cryptocurrency.

The SonicWall N-day


WatchTowr is back with yet another reverse-engineered vulnerability. More precisely, it’s two CVEs that are being chained together to achieve pre-auth Remote Code Execution (RCE) on SonicWall appliances. This exploit chain has been patched, but not everyone has updated, and the vulnerabilities are being exploited in the wild.

The first vulnerability at play is actually from last year, and is in Apache’s mod_rewrite module. This module is widely used to map URLs to source files, and it has a filename confusion issue where a url-encoded question mark in the path can break the mapping to the final filesystem path. A second issue is that when DocumentRoot is specified, instances of RewriteRule take on a weird dual-meaning. The filesystem target refers to the location inside DocumentRoot, but it first checks for that location in the filesystem root itself. This was fixed in Apache nearly a year ago, but it takes time for patches to roll out.

SonicWall was using a rewrite rule to serve CSS files, and the regex used to match those files is just flexible enough to be abused for arbitrary file read. /mnt/ram/var/log/httpd.log%3f.1.1.1.1a-1.css matches that rule, but includes the url-encoded question mark, and matches a location on the root filesystem. There are other, more interesting files to access, like the temp.db SQLite database, which contains session keys for the currently logged in users.

The other half of this attack is a really clever command injection using one of the diagnostic tools included in the SonicWall interface. Traceroute6 is straightforward, running a traceroute6 command and returning the results. It’s also got good data sanitization, blocking all of the easy ways to break out of the traceroute command and execute some arbitrary code. The weakness is that while this sanitization adds backslashes to escape quotes and other special symbols, it stores the result in a fixed-length result buffer. If the result of this escaping process overflows the result buffer, it writes over the null terminator and into the buffer that holds the original command before it’s sanitized. This overflow is repeated when the command is run, and with some careful crafting, this results in escaping the sanitization and including arbitrary commands. Clever.

The AI CVE DDoS


[Daniel Stenberg], lead developer of curl, is putting his foot down. We’ve talked about this before, even chatting with Daniel about the issue when we had him on FLOSS Weekly. Curl’s bug bounty project has attracted quite a few ambitious people, that don’t actually have the skills to find vulnerabilities in the curl codebase. Instead, these amateur security researchers are using LLMs to “find vulnerabilities”. Spoiler, LLMs aren’t yet capable of this task. But LLMs are capable of writing fake vulnerability reports that look very convincing at first read. The game is usually revealed when the project asks a question, and the fake researcher feeds the LLM response back into the bug report.

This trend hasn’t slowed, and the curl project is now viewing the AI generated vulnerability reports as a form of DDoS. In response, the curl Hackerone bounty program will soon ask a question with every entry: “Did you use an AI to find the problem or generate this submission?” An affirmative answer won’t automatically disqualify the report, but it definitely puts the burden on the reporter to demonstrate that the flaw is real and wasn’t hallucinated. Additionally, “AI slop” reports will result in permanent bans for the reporter.

It’s good to see that not all AI content is completely disallowed, as it’s very likely that LLMs will be involved in finding and describing vulnerabilities before long. Just not in this naive way, where a single prompt results in a vulnerability find and generates a patch that doesn’t even apply. Ironically, one of the tells of an AI generated report is that it’s too perfect, particularly for someone’s first report. AI is still the hot new thing, so this issue likely isn’t going away any time soon.

Bits and Bytes


A supply chain attack has been triggered against several hundred Magento e-commerce sites, via at least three software vendors distributing malicious code. One of the very odd elements to this story is that it appears this malicious code has been incubating for six years, and only recently invoked for malicious behavior.

On the WordPress side of the fence, the Ottokit plugin was updated last month to fix a critical vulnerability. That update was force pushed to the majority of WordPress sites running that plugin, but that hasn’t stopped threat actors from attempting to use the exploit, with the first attempts coming just an hour and a half after disclosure.

It turns out it’s probably not a great idea to allow control codes as part of file names. Portswigger has a report of a couple ways VS Code can do the wrong thing with such filenames.

And finally, this story comes with a disclaimer: Your author is part of Meshtastic Solutions and the Meshtastic project. We’ve talked about Meshtastic a few times here on Hackaday, and would be remiss not to point out CVE-2025-24797. This buffer overflow could theoretically result in RCE on the node itself. I’ve seen at least one suggestion that this is a wormable vulnerability, which may be technically true, but seems quite impractical in practice. Upgrade your nodes to at least release 2.6.2 to get the fix.


hackaday.com/2025/05/09/this-w…



a putin: ma combattere il nazismo implica anche non essere nazisti? a essere coerenti direi di si...


Saltzman apre all’Italia. Insieme dobbiamo avere un posto al tavolo dell’aerospazio

@Notizie dall'Italia e dal mondo

Buongiorno, non so se riuscirò a essere all’altezza di questa introduzione, è un vero piacere essere con voi all’Aerospace Power Conference per la seconda volta. Spesso la seconda volta è più difficile, perché devi ripetere il successo della prima, ma non



Chi è l’ammiraglio Ottaviani, alla guida della Direzione nazionale armamenti

@Notizie dall'Italia e dal mondo

Alla guida della Direzione nazionale degli armamenti arriva l’ammiraglio Giacinto Ottaviani, che lascerà il posto di sottocapo di Stato maggiore della Difesa. Lo ha deciso il Consiglio dei ministri su proposta del ministro della Difesa, Guido Crosetto, che ha così



Anti-ransomware Day 2025: come mitigare gli attacchi non convenzionali e con l’AI


@Informatica (Italy e non Italy 😁)
Secondo il report "State of Ransomware Report 2025", ci si attende un'evoluzione della minaccia, pronta a sfruttare vulnerabilità in accessi trascurati e poco presidiati, come webcam e dispositivi IoT. Ecco le tendenze




STATI UNITI. L’esercito espelle i soldati transgender


@Notizie dall'Italia e dal mondo
Con un nuovo ordine del Pentagono e l'avallo della Corte Suprema, migliaia di soldati vengono esclusi dalle forze armate per il solo fatto di essere transgender: una svolta che riaccende l'allarme sui diritti civili negli Stati Uniti.
L'articolo STATI UNITI. L’esercito espelle i soldati transgender



Julia Deck – Proprietà privata
freezonemagazine.com/articoli/…
Uccidere il gatto sarebbe stato un errore, in generale e in particolare. L’ho pensato quando mi hai spiegato cosa intendevi farne del cadavere. Era aprile, ci eravamo trasferiti già da sei mesi. Le case appena costruite risplendevano sotto il sole umido di rugiada, i pannelli solari scintillavano sui tetti e il prato cresceva fitto ai […]
L'articolo Julia Deck – Proprietà privata proviene da


Oggi è il Giorno della memoria dedicato alle vittime del terrorismo interno e internazionale e delle stragi di tale matrice, istituito nel 2007 e celebrato ogni anno il #9maggio, giorno dell’uccisione di Aldo Moro e di Peppino Impastato.


India-Pakistan: accuse reciproche di attacchi lungo il confine


@Notizie dall'Italia e dal mondo
Escalation militare dopo raid indiani in Kashmir: droni, artiglieria e vittime civili lungo la Linea di Controllo.
L'articolo India-Pakistan: accuse reciproche di attacchi lungo il confine proviene da pagineesteri.it/2025/05/09/asi…



L’Italia può contare (e pesare) nel futuro dell’Indo-Pacifico. La riflessione di Volpi

@Notizie dall'Italia e dal mondo

Indo-Pacifico. Da qualche anno è questa la parola chiave di ogni agenda strategica, il cuore di ogni esercitazione militare rilevante, il baricentro di ogni riflessione geopolitica con ambizione globale. Ma non si tratta solo di un concetto geografico allargato: è lo specchio dell’era multipolare che



Bill Gates donerà 200 miliardi di dollari alla sua fondazione di beneficenza


La cifra che metterà a disposizione è pari al 99 per cento del suo patrimonio

Gates, che ha 69 anni, ha motivato il cambio di programmi dicendo che il mondo si trova ad affrontare molti problemi urgenti e che lui vuole finanziare, e incoraggiare altri a farlo, nuovi strumenti per cercare di risolverli: «Ci sono troppi problemi urgenti da risolvere perché io trattenga risorse che potrebbero essere usate per aiutare le persone»

Gates ha indicato tre priorità della sua fondazione per il futuro: la mortalità infantile, le malattie infettive, principalmente poliomielite, morbillo e malaria, e iniziative legate all’istruzione

In un’intervista al Financial Times Gates ha esplicitamente attaccato Musk dicendo che «non è una bella immagine quella dell’uomo più ricco del mondo che sta uccidendo i bambini più poveri del mondo», spiegando che lo smantellamento di USAID potrebbe portare a una nuova ondata di morti e che va «ben oltre qualsiasi eliminazione degli sprechi»

ilpost.it/2025/05/09/bill-gate…




Di cosa si è discusso al Consiglio supremo di Difesa. Tutti i dettagli

@Notizie dall'Italia e dal mondo

Si è concluso il Consiglio supremo di Difesa, convocato dal presidente della Repubblica, Sergio Mattarella la scorsa settimana. Il massimo organo costituzionale responsabile per la sicurezza nazionale si è riunito per esaminare i più recenti sviluppi sullo scacchiere



MASAFER YATTA. Le ruspe israeliane cancellano Khalet El Dabaa, 100 palestinesi in strada


@Notizie dall'Italia e dal mondo
Distrutte 9 case, 6 grotte abitate, 10 cisterne d'acqua, 4 stalle, una cabina elettrica, l'impianto solare e il centro comunitario. Restano in piedi solo 3 strutture e la scuola
L'articolo MASAFER YATTA. Le ruspe israeliane



Nuvole, sogni e antenne.
freezonemagazine.com/articoli/…
Il potere della musica. Potere della musica, potere della parola ritmata dalla musica. Potere demonico, maieutico, che può essere, allo stesso tempo, violento e consolatorio, spaventoso e accogliente. Nella musica, i contrasti sembrano talvolta ricomporsi e la verità, le nostra verità, offrirsi in un breve lampo di illuminazione: si accende, e subito, non appena l’eco […]
L'articolo Nuvole, sogni
Il


Wow, un altro sistema proprietario!

Ne sentivamo il bisogno, vero? Mi chiedo perché non esista una big tech che investa seriamente su Linux, che come in questo caso avrebbe potuto essere un'alternativa già pronta (e soprattutto appetibile) a Windows.

Ah, già...il controllo! Dimenticavo.

Cosa ne pensate?

punto-informatico.it/harmonyos…

#os #huawei #linux

Unknown parent

@Andre123

Già! Se le aziende statunitensi sono ben lontane da un paradigma più etico, figuriamoci poi una big tech cinese quanto può avere a cuore la democrazia!



“Tech e Privacy”, la newsletter di Claudia Giulia, è online!

Tecnologia, geopolitica e società si intrecciano sempre di più.
Questa settimana parliamo della supremazia della Cina, dei problemi di Tesla, e poi NVIDIA e DOGE.
La NL è uscita eccezionalmente oggi, e non perderla

claudiagiulia.substack.com/p/n…

@Informatica (Italy e non Italy 😁)

reshared this



Independent ATProto infrastructure has been rapidly expanding recently, experiments with games on ATProto, and Graze offers developer grants.


Bluesky Report – #115

Independent ATProto infrastructure has been rapidly expanding recently, experiments with games on ATProto, and Graze offers developer grants.

I also run a weekly newsletter, where you get all the articles I published this week directly in your inbox, as well as additional analysis. You can sign up right here, and get the next edition tomorrow!

Independent Infrastructure news


Over the last week, the effort towards decentralisation and running independent pieces of ATProto infrastructure has sped up significantly. There are now multiple relays that are publicly accessible. Other people also have made alternate AppViews that are Bluesky-compatible. Combined, this makes it now possible to fully use Bluesky without using any infrastructure owned by Bluesky PBC, and the first people have done so. To do so means using a separate PDS, relay, AppView and client.

Some of the updates regarding relays:

  • Blacksky has built their own relay, using their own custom implementation. This relay is publicly accessible, meaning that other people can use this relay instead of the relay that Bluesky PBC uses.
  • A writeup on how to set up your own relay by Bluesky engineer Bryan Newbold, for some 34 USD/month.
  • Making relays cheaper has been due to the Sync 1.1 update, Bluesky PBC goes into more detail in a blog post what this entails.

And the updates regarding clients and AppViews:

  • Two clients now support the ability for users to set their own AppView, Deer and TOKIMEKI.
  • AppViewLite is another AppView for Bluesky that has been around for a while, that focuses on being cheap to run. It also heavily optimises for network data storage, with creator Alnkq running AppViewLite that contains full network data on a cheap 10 year old machine. So far, AppViewLite only worked with a custom frontend. An update this week now make it possible to use AppViewLite in combination with other clients.

Some further thoughts:

  • The way ATProto works, is that it takes the software that runs a social network and splits it up into separate components, with each of those components being able to be run independently. This has made self-hosting any component possible since the beginning of the network opening up. But to tak advantage of this, and get to a state of full independence, it means running multiple pieces of software. This has created a bit of a catch-22 in the ecosystem: you could run your own relay, but without another independent AppView to take advantage of this, it is not super useful. You could run your own (focused on the Bluesky lexicon) AppView, but without a client that allows you to set your own AppView it is not particularly useful either. What happened now in the last weeks is that all these individual pieces are starting to come together. With Deer allowing you to set your own custom AppView, there is now a use to actually run your own AppView. Which in turn also gives more purpose to running your own relay.
  • For building features in a Bluesky client that Bluesky itself does not have, a different AppView is needed. Now that these are starting to become available, there is new space to experiment with clients that have features that Bluesky does not have. Deer has already started going in this direction by allowing people to set any account as a trusted verifier, for example.
  • There has been skepticism around Bluesky PBC’s claims regarding decentralisation, especially from people within the ActivityPub community. Part of this distrust has come from people applying a mental framework of how ActivityPub works to how ATProto works. In this framework, Bluesky being decentralised would mean that there are other software platforms that are interoperable with the Bluesky lexicon. I’ll be writing more about those different mental frameworks, and how that relates to decentralisation later. But for now these developments strengthen the claims of Bluesky PBC around decentralisation and building a network that is ‘billionaire-proof’.


In Other News


at://2048 is the game of 2048, integrated with ATProto. 2048 is a sliding tile puzzle game where players combine numbered tiles to reach the 2048 tile, that has gotten popularity years ago and has been reimplemented a number of times. What makes the at://2048 version stand out is that the scores of the game are stored on your ATProto PDS. This creates new features and challenges: it gives the game a more social element, with features like leaderboards. It also creates a new challenge, of how to verify that a score on someone’s PDS is actually legit. at://2048 is experimenting with verified badges to authenticate if a score is legit. Integrating games with ATProto is one of the areas that is under-explored, and this reimplementation of 2048 is worth watching to get a sense of how the integration of games with ATProto will further develop.

Bluesky differs from other social networks in one significant way, namely that users blocking each other is public information. This creates new dynamics, from people being able to see who have blocked them, to leaderboards of the most blocked accounts on the network. A new paper, ‘Self-moderation in the decentralized era: decoding blocking behavior on Bluesky‘, takes advantages of data on blocks being public to study user behaviour. Some of their findings: “users who receive a high number of blocks exhibit distinctive behavioral traits that set them apart from the general user population. These patterns are not necessarily linked to toxicity or misinformation, indicating that block-worthy behavior is more nuanced and complex than traditional moderation markers might suggest. Second, these distinctive traits can be effectively encoded and leveraged by machine learning models, suggesting the feasibility of early-warning or flagging systems able to assist moderation teams by surfacing potentially problematic users even before issues escalate.”

Custom feed builder Graze is giving out 5 grants of 1k USD for other projects in the ATProto ecosystem. Explaining why the startup is giving out grants, Graze says: “First, we want to help accelerate growth in the ATProto / Bluesky ecosystem. Projects that help *others* are vital. Second, we want to empower communities to sustain themselves. Third, we want to help give people & orgs direct access to their audiences. Broadly, those are *our* goals as an org.”

Bluesky in the media


  • Time Magazine talks with Bluesky CEO Jay Graber and COO Rose Wang after they both got recognised as rising leaders in the Asian Pacific Community by Gold House. On monetisation, Graber says “she’s considering subscription models or monetizing Bluesky’s marketplaces of custom tools, but no concrete plans have been set in motion.”
  • Wired published an article on how digital archivists are racing to save Black History while the Trump administration is trying to erase it. Wired talks with Blacksky’s Rudy Fraser, who describes “Blacksky as a living archive. Currently its database holds 17 million posts from Black users over the last two years”.
  • How the San Francisco Standard uses Graze to hone their social media strategyGraze


ATProto tech news


  • The two developers behind Git collaboration platform Tangled, the brothers Anirudh and Akshay Oppiliappan, gave an interview on the devtools.fm podcast about Tangled. The platform also got various feature updates this week, and customisable profiles.
  • Graze has made their ATProto authentication tool open-source and available for everyone to use. The ‘ATmosphere Authentication, Identity, and Permission Proxy‘ allows developers to easily add ATProto authentication to their software as a separate micro-service.
  • WhiteBreeze is a self-hostable frontend for WhiteWind, allowing people to build their own blog on ATProto.
  • ATProto Migrator is a tool to migrate your ATProto account to a different PDS. It does so via a web application, without people having to touch the Command Line Interface (CLI). This makes account migration more accessible, as other tools until now (such as goat by Bluesky engineer Bryan Newbold) require people to use the CLI.
  • Flashes is a Bluesky client focused on images, and they are experimenting with some new ways to deal with the limitations that come from using Bluesky’s data. A Bluesky post can contain a maximum of 4 images and 300 characters. Flashes has upgraded that limit to 900 characters and 12 images. It works by actually creating 3 separate Bluesky posts in a thread, and displaying this as a single post in the Flashes app.
  • A guide on Publishing ATProto Lexicons.

That’s all for this week, thanks for reading! If you want more analysis, you can subscribe to my newsletter. Every week you get an update with all this week’s articles, as well as extra analysis not published anywhere else. You can subscribe below, and follow this blog @fediversereport.com and my personal account @laurenshof.online on Bluesky.

#bluesky

fediversereport.com/bluesky-re…





Un recente studio sulle modalità di comunicare informazioni sul cambiamento climatico, mostra come rendere più incisivo il messaggio: con visualizzazioni binarie dei dati invece che tramite dati continui.


Binary climate data visuals amplify perceived impact of climate change
Grace Liu, Jake C. Snell, …Rachit Dubey
Nature Human Behaviour (2025)

nature.com/articles/s41562-025…


Le visualizzazioni binarie dei dati climatici amplificano l'impatto percepito del cambiamento climatico

Per gran parte della popolazione mondiale, il cambiamento climatico appare come un lento e graduale cambiamento del tempo quotidiano.
Questo porta molti a percepire i suoi impatti come minori e a generare apatia (l'effetto "rana bollita"). Come possiamo trasmettere l'urgenza della crisi quando i suoi impatti appaiono così sottili?

Attraverso una serie di esperimenti cognitivi su larga scala (N = 799), abbiamo scoperto che presentare alle persone dati climatici binari (ad esempio, le immagini sulle differenze nelle date del congelamento dei laghi) aumenta significativamente l'impatto percepito del cambiamento climatico rispetto a fornire dei dati continui (ad esempio, la temperatura media).
...i dati binari aumentano l'impatto percepito, creando una "illusione" di cambiamenti improvvisi.
...
Questi risultati, replicati in modo robusto in più esperimenti, forniscono una base cognitiva per l'effetto "rana bollita" e offrono un approccio basato sulla psicologia ai politici e agli educatori per migliorare la comunicazione sui cambiamenti climatici, mantenendo l'accuratezza scientifica.



Perché infangare i verminai, paragonandoli alle cose che avvengono nel, vicino, intorno al Porto di Genova?

E meno male che ci sono ancora validi giornalisti a scoperchiarlo.

shippingitaly.it/2025/05/08/il…

facebook.com/share/19D1w9Y4V4/



Un recente articolo su Nature cambiamento climatico esplora le diseguaglianze di emissione di gas serra derivati dai più ricchi


I gruppi ad alto reddito contribuiscono in modo sproporzionato agli estremi climatici in tutto il mondo


High-income groups disproportionately contribute to climate extremes worldwide
Sarah Schöngart, Zebedee Nicholls, …Carl-Friedrich Schleussner
Nature Climate Change (2025)

www.nature.com/articles/s41558-025-02325-x


L'ingiustizia climatica persiste e i meno responsabili spesso sopportano i maggiori impatti, sia tra i paesi che tra i singoli all'interno dei paesi.
Qui mostriamo come le emissioni da gas serra, attribuibili ai consumi e agli investimenti dei gruppi di popolazione più ricchi, hanno influenzato in modo sproporzionato gli attuali cambiamenti climatici.
Colleghiamo la disuguaglianza delle emissioni nel periodo 1990-2020 a estremi climatici regionali... due terzi cioè 66% del riscaldamento sono attribuibili al 10% più ricco nella popolazione (ben un quinto, cioè il 20%, è attribuibile all' 1% più ricco), il che significa che la responsabilità dei contributi individuali è 6,5 volte quella dei contributi pro capite medi (addirittura è di 20 volte per i più ricchi).

Quantificare il collegamento tra le disparità di ricchezza e gli impatti climatici può aiutare nel discorso sull'equità e la giustizia climatica.


👆🏻La toccano piano ma leggendo, ben tra le righe del testo dell' articolo, suggeriscono una tassazione globale internazionale, allineata ai consumi e alla finanza transfrontaliera. 🤯
👏🏻👏🏻👏🏻

marcolo reshared this.



SelfWelcome to Friendica!


Eccomi qui, già utente di livellosegreto.it a cui mancano i ''gruppi'' come nel social blu quindi...ci si prova!

Perennemente interessato alla ricerca di arte in tutte le sue forme che essa sia sonora, visiva od intellettuale.

Ora e sempre viva l'ozio, la voglia di ragionare e di crescere ed il divano (lo so, è collegato all'ozio ma volevo rimarcare il concetto) ♥

in reply to depand456

Ciao @depand456 e benvenuto!

Se vuoi sapere cosa succede qui, puoi iniziare da

1) Questo link poliverso.org/community che ti mostra i contenuti prodotti dagli utenti del solo server Poliverso
2) Questo link poliverso.org/community/global che ti mostra i contenuti prodotti dagli utenti di server diversi da Poliverso3) Questo link poliverso.org/network dove vedrai gli aggiornamenti dei tuoi contatti; e se anche non hai ancora contatti (e quindi non vedrai nulla nella pagina principale), puoi dare un'occhiata ai link a sinistra, dove troverai un filtro sui contenuti, in base alla tua lingua, gli ultimi contenuti pubblicati oppure tag come #Art #Socialmedia e #USA.
4) Questo link poliverso.org/calendar che ti mostra gli eventi federati condivisi da persone del tuo server o dai contatti dei tuoi contatti

Infine ti do il link di un promemoria utile per i nuovi utenti Friendica (ma anche per quelli meno nuovi)


I dieci comandamenti di Friendica. Cosa fare con l’account che abbiamo aperto su Poliverso?

Ecco una sorta di decalogo su Friendica. Ci sono molti link che possono appesantire la lettura, ma speriamo che vi piaccia e soprattutto ci auguriamo che lo troviate utile!

informapirata.it/2025/02/02/i-…

#Fediverse #Fediverso #Friendica

[ap_content


in reply to Signor Amministratore ⁂

@Signor Amministratore ⁂ grazie mille! Il tuo messaggio ed il tuo link rispondono già ad alcune domande che mi stavo ponendo, poi con calma mi rileggo tutto bene e cerco di imparare un po' alla volta 😊


Prevost: la scheda redatta dalle persone sopravvissute ad abusi

Ecco la pagina che la rete delle persone sopravvissute ad abusi nella chiesa cattolica, in sigla SNAP, dedicava prima dell'elezione a Prevost . Se clicchiamo sul bottone rosso "Read Vos Estis report", ecco il carteggio della SNAP inviato in vaticano, perchè anche a Prevost fosse applicata la legge istituita da Bergoglio sugli abusi. Si legge di un caso di abusatore con 13 vittime conclamate non protette nell'Illinois, e di sentenze della giustizia civile peruviana che scrivono nero su bianco dell'inazione della diocesi guidata da Prevost nel contrastare altri casi di abusi su almeno tre persone. Peccato che lo stesso Bergoglio prenda un infrattore della legge da lui istituita, e lo metta - con potere crescente - in un ruolo chiave per la nomina di vescovi.
"Tutto apposto".
- -

As provincial of the Augustinians, Prevost allowed Father James Ray, a priest then accused of abusing minors whose ministry had been restricted since 1991, to reside at the Augustinians' St. John Stone Friary in Chicago in 2000, despite its proximity to a Catholic elementary school. When Prevost was Bishop of Chiclayo, three victims reported to civil authorities in 2022 after there was no movement on their canonical case filed through the diocese. Victims have since claimed Prevost failed to open an investigation, sent inadequate information to Rome, and that the diocese allowed the priest to continue saying mass.

SNAP filed a complaint against Prevost under the pope’s 2023 decree Vos estis lux mundi on March 25, 2025

Vos estis lux mundi, Pope Francis’ 2023 decree, allows any bishop, cardinal, or religious superior to be reported and investigated for abuse or cover-up. These complaints, submitted to the Vatican, are not verdicts of guilt. They are evidence-based calls for investigation—each meeting the church’s own standard of “serious indications” that a violation occurred. In civil terms, this is equivalent to probable cause or reasonable grounds to investigate.

Every filing draws from a solid foundation of survivor and eyewitness testimony, public records and church statements, independent investigations by media and legal experts, official church documents and canonical proceedings, testimony, depositions, and court-ordered documents from criminal and civil cases.