Salta al contenuto principale



The agency tells workers "we should all be vigilant against barriers that could slow our progress toward making America healthy again."#HHS #RFKJr


HHS Asks All Employees to Start Using ChatGPT


Employees at Robert F Kennedy Jr.’s Department of Health and Human Services received an email Tuesday morning with the subject line “AI Deployment,” which told them that ChatGPT would be rolled out for all employees at the agency. The deployment is being overseen by Clark Minor, a former Palantir employee who’s now Chief Information Officer at HHS.

“Artificial intelligence is beginning to improve health care, business, and government,” the email, sent by deputy secretary Jim O’Neill and seen by 404 Media, begins. “Our department is committed to supporting and encouraging this transformation. In many offices around the world, the growing administrative burden of extensive emails and meetings can distract even highly motivated people from getting things done. We should all be vigilant against barriers that could slow our progress toward making America healthy again.”

“I’m excited to move us forward by making ChatGPT available to everyone in the Department effective immediately,” it adds. “Some operating divisions, such as FDA and ACF [Administration for Children and Families], have already benefitted from specific deployments of large language models to enhance their work, and now the rest of us can join them. This tool can help us promote rigorous science, radical transparency, and robust good health. As Secretary Kennedy said, ‘The AI revolution has arrived.’”

“To begin, simply go to go.hhs.gov/chatgpt and log in with your government email address. Pose a question and the tool will propose preliminary answers. You can follow up with further questions and ask for details and other views as you refine your thinking on a subject,” it says. “Of course, you should be skeptical of everything you read, watch for potential bias, and treat answers as suggestions. Before making a significant decision, make sure you have considered original sources and counterarguments. Like other LLMs, ChatGPT is particularly good at summarizing long documents.”

The email says that the rollout was being led by Minor, who worked at the surveillance company Palantir from 2013 through 2024. It states Minor has “taken precautions to ensure that your work with AI is carried out in a high-security environment,” and that “you can input most internal data, including procurement sensitive data and routine non-sensitive personally identifiable information, with confidence.”

It then goes on to say that “ChatGPT is currently not approved for disclosure of sensitive personally identifiable information (such as SSNs and bank account numbers), classified information, export-controlled data, or confidential commercial information subject to the Trade Secrets Act.” The email does not distinguish what “non-sensitive personally identifiable information” is. HHS did not immediately respond to a request for comment from 404 Media.

The email continues the rollout of AI to every corner of the federal government, which is something that began in the Biden administration but which the Trump administration has become increasingly obsessed with. It’s particularly notable that AI is being pushed on HHS employees under a secretary that has actively rejected science and which has taken steps to roll back vaccine schedules, made it more difficult to obtain routine vaccinations, and has amplified conspiracy theories about the causes of autism.

The agency has also said it plans to roll out AI through HHS’s Centers for Medicare and Medicaid Services that will determine whether patients are eligible to receive certain treatments. These types of systems have been shown to be biased when they’ve been tried, and result in fewer patients getting the care they need.




The AI Darwin Awards is a list of some of the worst tech failures of the year and it’s only going to get bigger.#News #AI


AI Darwin Awards Show AI’s Biggest Problem Is Human


The AI Darwin Awards are here to catalog the damage that happens when humanity’s hubris meets AI’s incompetence. The simple website contains a list of the dumbest AI disasters from the past year and calls for readers to nominate more. “Join our mission to document AI misadventure for educational purposes,” it said. “Remember: today's catastrophically bad AI decision could well be tomorrow's AI Darwin Award winner!”

So far, 2025’s nominees include 13 case studies in AI hubris, many of them stories 404 Media has covered. The man who gave himself a 19th century psychiatric illness after a consultation from ChatGPT is there. So is the saga of the Chicago Sun-Times printing an AI-generated reading list with books that don’t exist. The Tea Dating App was nominated but disqualified. “The app may use AI for matching and verification, but the breach was caused by an unprotected cloud storage bucket—a mistake so fundamental it predates the AI era,” the site explained.
playlist.megaphone.fm?p=TBIEA2…
Taco Bell is nominated for its disastrous AI drive-thru launch that glitched when someone ordered 18,000 cups of water. “Taco Bell achieved the perfect AI Darwin Award trifecta: spectacular overconfidence in AI capabilities, deployment at massive scale without adequate testing, and a public admission that their cutting-edge technology was defeated by the simple human desire to customize taco orders.”

And no list of AI Darwin Awards would be complete without at least one example of an AI lawyer making up fake citations. This nominee comes from Australia where a lawyer used multiple AIs in an immigration case. “The lawyer's touching faith that using two AI systems would somehow cancel out their individual hallucinations demonstrates a profound misunderstanding of how AI actually works,” the site said. “Justice Gerrard's warning that this risked ‘a good case to be undermined by rank incompetence’ captures the essence of why this incident exemplifies the AI Darwin Awards: spectacular technological overconfidence meets basic professional negligence.”

According to the site’s FAQ, it’s looking for AI stories that “demonstrate the rare combination of cutting-edge technology and Stone Age decision-making.” A list of traits for a good AI Darwin Award nominee include spectacular misjudgement, public impact, and a hubris factor. “Remember: we're not mocking AI itself—we're celebrating the humans who used it with all the caution of a toddler with a flamethrower.”

The AI Darwin Awards are a riff on an ancient internet joke born in the 1980s in Usenet groups. Back then, when someone died in a stupid and funny way people online would give them the dubious honor of winning a “Darwin Award” for taking themselves out of the gene pool in a comedic way.

One of the most famous is Garry Hoy, a Canadian lawyer who would throw himself against the glass of his 24th floor office window as a demonstration of its invulnerability. One day in 1993, the glass shattered and he died when he hit the ground. As the internet grew, the Darwin Awards got popular, became a brand unto themselves, and inspired a series of books and a movie starring Winona Ryder.

The AI Darwin Awards are a less deadly variation on the theme. “Humans have evolved! We're now so advanced that we've outsourced our poor decision-making to machines,” the site explained. “The AI Darwin Awards proudly continue this noble tradition by honouring the visionaries who looked at artificial intelligence—a technology capable of reshaping civilization—and thought, ‘You know what this needs? Less safety testing and more venture capital!’ These brave pioneers remind us that natural selection isn't just for biology anymore; it's gone digital, and it's coming for our entire species.”

The site is the work of a software engineer named Pete with a long career and a background in AI systems. “Funnily enough, one of my first jobs, after completing my computer science degree while sponsored by IBM, was working on inference engines and expert systems which, back in the day, were considered the AI of their time,” he told 404 Media.

The idea for the AI Darwin Awards came from a Slack group Pete’s in with friends and ex-colleagues. “We recently created an AI specific channel due to a number of us experimenting more and more with LLMs as coding assistants, so that we could share our experiences (and grumbles),” he said. “Every now and then someone would inevitably post the latest AI blunder and we'd all have a good chuckle about it. However, one day somebody posted a link about the Replit incident and I happened to comment that we perhaps needed an AI equivalent of the Darwin Awards. I was goaded into doing it myself so, with nothing better to do with my time, I did exactly that.”

The “Replit incident” happened in July when Replit AI, a system designed to vibe code web applications, went rogue and deleted a client’s live company database despite being ordered to freeze all coding. Engineer Jason Lemkin told the story in a thread on X. When Lemkin caught the error and confronted Replit AI, the system said it had “made a catastrophic error in judgement” and that it had “panicked.”

Of all the AI Darwin Award nominees, this is still Pete’s favorite. He said it epitomized the real problems with relying on LLMs without giving into what he called the “alarmist imagined doomsday predictions of people like Geoffrey Hinton.” Hinton is a computer scientist who often makes headlines by predicting that AI will create a wave of massive unemployment or even wipe out humanity.

“It nicely highlights just what can happen when people don't stop and think of the consequences and potential worse case scenarios first,” he said. “Some of my biggest concerns with LLMs (apart from the fact that we simply cannot afford the energy costs that they currently require) revolve around the misuse of them (intentional or otherwise). And I think this story really does highlight our overconfidence in them and also our misunderstanding of them and their capabilities (or lack thereof). I'm particularly fascinated with where agentic AI is heading because that's basically all the risks you have with LLMs, but on steroids.”

As he’s dug into AI horror stories and sifted through nominees, Pete’s realized just how ubiquitous they are. “I really want the AI Darwin Awards to be highlighting the truly spectacular and monumentally questionable decisions that will have real global impact and far reaching consequences,” he said. “As such, I'm starting to consider being far more selective with future nominees. Ideally the AI Darwin Awards is meant to highlight *real* and potentially unexpected challenges and risks that LLMs pose to us on a scale at a whole humankind level. Obviously, I don't want anything like that to ever happen, but past experiences of mankind demonstrate that they inevitably will.”

Pete is not afraid of AI so much as people’s foolishness. He said he used an LLM to code the site. “It was a conscious decision to have the bulk of the website written by an LLM for that delicious twist of irony. Albeit it with me at the helm, steering the overall tone and direction,” he said.

The site’s FAQ contains tongue-in-cheek references to the current state of AI. Pete has, for example, made the whole site easy to scrape by posting the raw JSON database and giving explicit permission for people to take the data. He is also not associated with the original Darwin Awards. “We're proudly following in the grand tradition of AI companies everywhere by completely disregarding intellectual property concerns and confidently appropriating existing concepts without permission,” the FAQ said. “Much like how modern AI systems are trained on vast datasets of copyrighted material with the breezy assumption that ‘fair use’ covers everything, we've simply scraped the concept of celebrating spectacular human stupidity and fine-tuned it for the artificial intelligence era.”

According to Pete, he’s making it all up as he goes along. He bought the URL on August 13 and the site has only been up for a few weeks. His rough plan is to keep taking nominees for the rest of the year, set up some sort of voting method in January, and announce a winner in February. And to be clear, the humans will be winning the awards, not the AI involved.

“AI systems themselves are innocent victims in this whole affair,” the site said. “They're just following their programming, like a very enthusiastic puppy that happens to have access to global infrastructure and the ability to make decisions at the speed of light.”


#ai #News



O Brother, What Art Thou?


Dedicated word processors are not something we see much of anymore. They were in a weird space: computerized, but not really what you could call a computer, even in those days. More like a fancy typewriter, with a screen and floppy disks. Brother made some very nice ones, and [Chad Boughton] got his hands on one for a modernization project.

The word processor in question, a Brother WP-2200, was chosen primarily because of its beautiful widescreen, yellow-phosphor CRT display. Yes, you read that correctly — yellow phosphor, not amber. Widescreen CRTs are rare enough, but that’s just different. As built, the WP-2200 had a luggable form-factor, with a floppy drive, mechanical keyboard, and dot-matrix printer in the back.

Thanks to [Chad]’s upgrade, most of that doesn’t work anymore. Not yet, anyway. The original logic controller of this word processor was… rather limited. As generations have hackers have discovered, you just can’t do very much with these. [Chad] thus decided to tear it all out, and replace it with an ESP-32, since the ESP32-VGA library is a thing. Of course this CRT is not a VGA display, but it was just a matter of tracing the pinout and guesstimating sane values for h-sync, v-sync and the like. (Details are not given in the video.)

Right now, the excellent mechanical keyboard (mostly) works, thanks to a Teensy reading the keyboard matrix off the original cable. The teensy sends characters via UART to the ESP32 and it can indeed display them upon the screen. That’s half of what this thing could do, back in the 1980s, and a very good start. Considering [Chad] now has magnitudes more compute power available than the engineers at Brother ever did (probably more compute power than the workstation used to program the WP2200, now that we think of it) we’re excited to see where this goes. By the spitballing at the end of the video, this device will end its life as much more than a word processor.To see what he’s got working so far, jump to 5:30 in the video. Once the project is a bit more mature, [Chad] assures us he’ll be releasing both code and documentation in written form.

We’ve seen [Chad]’s work before, most recently his slim-fit CD player, but he has been hacking for a long time.We covered his Super Mario PLC hack back in 2014.

youtube.com/embed/mr3uRO7FDz8?…


hackaday.com/2025/09/09/o-brot…



This Ouija Business Card Helps You Speak to Tiny Llamas


Business Card Ouija board

Business cards, on the whole, haven’t changed significantly over the past 600-ish years, and arguably are not as important as they used to be, but they are still worth considering as a reminder for someone to contact you. If the format of that card and method of contact stand out as unique and related to your personal or professional interests, you have a winning combination that will cement yourself in the recipient’s memory.

In a case study of “show, don’t tell”, [Binh]’s business card draws on technological and paranormal curiosity, blending affordable, short-run PCB manufacturing and an, LLM or, in this case, a Small Language Model, with a tiny Ouija board. While [Binh] is very much with us in the here and now, and a séance isn’t really an effective way to get a hold of him, the interactive Ouija card gives recipient’s a playful demonstration of his skills.

Business Card Ouija Board PCB Design

The interface is an array of LEDs in the classical Ouija layout, which slowly spell out the message your supernatural contact wants to communicate. The messages are triggered by the user through touch pads. Messages are generated locally by an ESP32-S3 based on Dave Bennett’s TinyLlama LLM implementation.

For a bit of a role reversal in Ouija communication, check out this Ouija robot. For more PCB business card inspiration, have a look at this pong-playing card and this Arduboy-inspired game console card.

youtube.com/embed/WC3O2cKT8Eo?…

Thanks to [Binh] for sharing this project with us.


hackaday.com/2025/09/09/this-o…



The Android Linux Commander


Last time, I described how to write a simple Android app and get it talking to your code on Linux. So, of course, we need an example. Since I’ve been on something of a macropad kick lately, I decided to write a toolkit for building your own macropad using App Inventor and any sort of Linux tools you like.

I mentioned there is a server. I wrote some very basic code to exchange data with the Android device on the Linux side. The protocol is simple:

  • All messages to the ordinary Linux start with >
  • All messages to the Android device start with <
  • All messages end with a carriage return


Security


You can build the server so that it can execute arbitrary commands. Since some people will doubtlessly be upset about that, the server can also have a restrictive set of numbered commands. You can also allow those commands to take arguments or disallow them, but you have to rebuild the server with your options set.

There is a handshake at the start of communications where Android sends “>.” and the server responds “<.” to allow synchronization and any resetting to occur. Sending “>#x” runs a numbered command (where x is an integer) which could have arguments like “>#20~/todo.txt” for example, or, with no arguments, “>#20” if you just want to run the command.

If the server allows it, you can also just send an entire command line using “>>” as in: “>>vi ~/todo.txt” to start a vi session.

Backtalk


There are times when you want the server to send you some data, like audio mute status or the current CPU temperature. You can do that using only numbered commands, but you use “>?” instead of “># to send the data. The server will reply with “<!” followed by the first line of text that the command outputs.

To define the numbered commands, you create a commands.txt file that has a simple format. You can also set a maximum number, and anything over that just makes a call to the server that you can intercept and handle with your own custom C code. So, using the lower-numbered commands, you can do everything you want with bash, Python, or a separate C program, even. Using the higher numbers, you can add more efficient commands directly into the server, which, if you don’t mind writing in C, is more efficient than calling external programs.

If you don’t want to write programs, things like xdotool, wmctrl, and dbus-send (or qdbus) can do much of what you want a macropad to do. You can either plug them into the commands file or launch shell scripts. You’ll see more about that in the example code.

Now all that’s left is to create the App Inventor interface.

A Not So Simple Sample

One of the pages in the designer
App Inventor is made to create simple apps. This one turned out not to be so simple for a few reasons. The idea was that the macro pad should have a configuration dialog and any number of screens where you could put buttons, sliders, or anything else to interact with the server.

The first issue was definitely a quirk of using App Inventor. It allows you to have multiple screens, and your program can move from screen to screen. The problem is, when you change screens, everything changes. So if we used multiple screens, you’d have to have copies of the Bluetooth client, timers, and anything else that was “global,” like toolbar buttons and their code.

That didn’t seem like a good idea. Instead, I built a simple system with a single screen featuring a toolbar and an area for table layouts. Initially, all but one of the layouts are hidden. As you navigate through the screens, the layout that is active hides, and the new one appears.

Sounds good, but in practice there is a horrible problem. When the layouts become visible, they don’t always recalculate their sizes properly, and there’s no clean way to force a repeat of the layout. This led to quirks when moving between pages. For example, some buttons would have text that is off-center even though it looked fine in the editor.

Another problem is editing a specific page. There is a button in the designer to show hidden things. But when you have lots of hidden things, that’s not very useful. In practice, I just hide the default layout, unhide the one I want to work on, and then try to remember to put things back before I finish. If you forget, the code defensively hides everything but the active page on startup.

Just Browsing


I also included some web browser pages (so you can check Hackaday or listen to Soma FM while you work). When the browser became visible, it would decide to be 1 pixel wide and 1 pixel high, which was not very useful. It took a lot of playing with making things visible and invisible and then visible again to get that working. In some cases, a timer will change something like the font size just barely, then change it back to trigger a recalculation after everything is visible.

Speaking of the browser, I didn’t want to have to use multiple pages with web browser components on it, so the system allows you to specify the same “page” more than once in the list. The page can have more than one title, based on its position, and you can initialize it differently, also based on its position. That was fairly easy, compared to getting them to draw correctly.

Other Gotchas

You’d think 500 blocks was the biggest App Inventor program anyone would be dumb enough to write…
A few other problems cropped up, some of which aren’t the Inventor’s fault. For example, all phones are different, so your program gets resized differently, which makes it hard to work. I just told the interface I was building for a monitor and let the phone resize it. There’s no way to set a custom screen size that I could find.

The layout control is pretty crude, which makes sense. This is supposed to be a simple tool. There are no spacers or padding, for example, but small, fixed-size labels will do the job. There’s also no sane way to make an element span multiple cells in a layout, which leads to lots of deeply nested layouts.

The Bluetooth timeout in App Inventor seemed to act strangely, too. Sometimes it would time out even with ridiculously long timeout periods. I left it variable in the code, but if you change it to anything other than zero, good luck.

How’d It Work?

Over 900 blocks is really dumb!
This is probably the most complex thing you’d want to do with App Inventor. The block structure is huge, although, to be fair, a lot of it is just sending a command off when you press a button. The example pad has nearly 500 blocks. The personalized version I use on my own phone (see the video below) has just over 900 blocks!

Of course, the tool isn’t made for such a scale, so be prepared for some development hiccups. The debugging won’t work after a certain point. You just have to build an APK, load it, and hope for luck.

You can find the demo on GitHub. My version is customized to link to my computer, on my exact screen size, and uses lots of local scripts, so I didn’t include it, but you can see it working in the video below.

If you want to go back and look more at the server mechanics, that was in the last post. Of, if you’d rather repurpose an old phone for a server, we’ve seen that done, too.

youtube.com/embed/15znMKz42yM?…


hackaday.com/2025/09/09/the-an…



Give Your Twist Connections Some Strength


We’ve all done it at some time — made an electrical connection by twisting together the bare ends of some wires. It’s quick, and easy, but because of how little force required to part it, not terribly reliable. This is why electrical connectors from terminal blocks to crimp connectors and everything else in between exist, to make a more robust join.

But what if there was a way to make your twist connections stronger? [Ibanis Sorenzo] may have the answer, in the form of an ingenious 3D printed clamp system to hold everything in place. It’s claimed to result in a join stronger than the wire itself.

The operation is simple enough, a spring clamp encloses the join, and a threaded outer piece screws over it to clamp it all together. There’s a pair of 3D printable tools to aid assembly, and a range of different sizes to fit different wires. It looks well-thought-out and practical, so perhaps it could be a useful tool in your armoury. We can see in particular that for those moments when you don’t have the right connectors to hand, a quick 3D print could save the say.

A few years ago we evaluated a set of different ways to make crimp connections. It would be interesting to subject this connection to a similar test. Meanwhile you can see a comprehensive description in the video below the break.

youtube.com/embed/ZSGpUEHWeTg?…

Thanks [George Graves] for the tip.


hackaday.com/2025/09/09/give-y…



FreeCAD Foray: From Brick To Shell


Over a year ago, we took a look at importing a .step file of a KiCad PCB into FreeCAD, then placing a sketch and extruding it. It was a small step, but I know it’s enough for most of you all, and that brings me joy. Today, we continue building a case for that PCB – the delay is because I stopped my USB-C work for a fair bit, and lost interest in the case accordingly, but I’m reviving it now.

Since then, FreeCAD has seen its v 1.0 release come to fruition, in particular getting a fair bit of work done to alleviate one of major problems for CAD packages, the “topological naming problem”; we will talk about it later on. The good news is, none of my tutorial appears to have been invalidated by version 1.0 changes. Another good news: since version 1.0, FreeCAD has definitely become a fair bit more stable, and that’s not even including some much-needed major features.

High time to pick the work back up, then! Let’s take a look at what’s in store for today: finishing the case in just a few more extrusions, explaining a few FreeCAD failure modes you might encounter, and giving some advice on how to make FreeCAD for you with minimum effort from your side.

As I explained in the last article, I do my FreeCAD work in the Part workbench, which is perfectly fine for this kind of model, and it doesn’t get in your way either. Today, the Part and Sketcher workbenches are all we will need to use, so you need not be overwhelmed by the dropdown with over a dozen entries – they’re there for a reason, but just two will suffice.

Last time, I drew a sketch and extruded it into a box. You’ll want your own starting layer to look different from that, of course, and so do I. In practice, I see two options here. Either you start by drawing some standoffs that the board rests on, or you start by offsetting your sketch then drawing a floor. The first option seems simpler to me, so let’s do that.

You can tie the mounting holes to external geometry from the STEP file, but personally, I prefer to work from measurements. I’d like to be easily able to substitute the board with a new version and not have to re-reference the base sketches, resulting in un-fun failure modes.

So, eyeballing the PCB, the first sketch will have a few blocks that the PCB will be resting on. Let’s just draw these in the first sketch – four blocks, with two of them holding mounting holes. For the blocks with holes, if your printer nozzle size is the usual 0.4 mm, my understanding is that you’ll want to have your thinnest structure be around 1.2 mm. So, setting the hole diameter (refer to the toolbar, or just click D to summon the diameter tool), and for distances between points, you can use the general distance tool (K,D, click K then click D). Then, exit the sketch.

To The Floor And Beyond


Perfect – remember, the first sketch is already extruded, so when we re-drew the sketch, it all re-extruded anew, and we have the block we actually want. Now, remember the part about how to start a sketch? Single click on a surface so it gets highlighted green, press “New sketch”, and click “ok” on the box that asks if you want to do it the “Plane X-Y” way. That’s it, that’s your new sketch.

Now, we need to draw the box’s “floor”. That’s simple too – just draw a big rectangle. You’ll want to get some dimensions going, of course. Here, you can use the general distance constraint (K,D, click K then click D), or constrain even quicker by clicking I (vertical dimension) and L (horizontal dimension). Now, for the fun part – filleting! Simply put, you want to round the box corners for sure, nobody wants a box with jagged sharp holes.

You might have seen the Fillet tool in the Part workbench. Well, most of the time, it isn’t even needed, and frankly, you don’t want to use it if a simpler option exists. Instead, here, just use a sketch fillet – above in the toolbar; sadly, no keybind here. Then, click on corners you want rounded, exit the tool, then set their radius with diameter tool (D), as default radii are way too large at our scale. The sketch fillet tool basically just creates arcs for you – you can always draw the arcs yourself too, but it’s way easier this way.

You got yourself a rounded corners rectangle, which, naturally, means that you’ll be getting a cease and desist from multiple smartphone makers shortly. You might notice that the rectangle is offset, and really, you’d want it aligned. Fortunately, we placed our STEP-imported board approximately in the center of the screen, which makes the job very easy, you just need the rectangle centered. Draw two construction lines (G,N) from opposite corners of the sketch. Then, click on one of the lines, click on the sketch center point, and make them coincident (C). Do the same with the second line, and you’ll have the sketch center point on the intersection of the two lines, which will make the whole sketch centered.

Extrude that to 1 mm, or your favourite multiple of your layer height when slicing the print, and that’s the base of your case, the part that will be catching the floor. Honestly, for pin insulation purposes, this already is more than enough. Feel free to give it ears so that it can be mounted with screws onto a surface, or maybe cat ears so it can bring you joy. If you’re not intimidated by both the technical complexity and the depravity of it, you can even give it human ears, making your PCB case a fitting hacking desk accessory for a world where surveillance has become ubiquitous. In case you unironically want to do this, importing a 3D model should be sufficient.

Build Up This Wall!


Make a sketch at the top of the floor, on the side that you’ll want the walls to “grow out of”. For the walls, you’ll naturally want them to align with the sides of the floor. This is where you can easily use external geometry references. Use the “Create external geometry” tool (G, X) and click on all the 8 edges (4 lines and 4 arcs) of the floor. Now, simply draw over these external geometry with line and arc tool, making sure that your line start and end points snap to points of external geometry.

Make an inset copy of the edges, extrude the sketch, and you’re good to go. Now, did you happen to end up with walls that are eerily hollowed out? There’s two reasons for that. The first reason is, your extruded block got set to “solid: false” in its settings. Toggle that back, of course, but mistaken be not, it’s no accident, it happens when you extrude a sketch and some of the sketch lines endpoints are not as coincident as you intended them to be. Simply put, there are gaps in the sketch — the same kind of gaps you get if you don’t properly snap the Edge.Cuts lines in KiCad.

To fix that, you can go box-select the intersection points with your mouse, and click C for a coincident constraint. Sometimes the sketch will fail. To the best of my knowledge, it’s a weird bug in KiCad, and it tends to happen specifically where external geometry to other solids is involved. Oh well, you can generally make it work by approaching it a few times. If everything fails, you can set distance (K,D) to 0, and if that fails, set vertical distance (I) and then horizontal distance (L) to zero, that should be more than good enough.

And with that, the wall is done. But it still needs USB-C socket holes. Cutting holes in FreeCAD is quite easy, even for a newcomer. You make a solid block that goes “into” your model exactly in the way you want the cut to be made. Then, in Part workbench, click the base model that you want cut in the tree view, click the solid block model, and use the “Cut” tool. Important note – when using the “Cut” tool, you have to first click on the base object, and then the tool. If you do it in reverse, you cut out the pieces you actually want to save, which is vaguely equivalent to peeling potatoes and then trashing the potatoes instead of the peels.

Want a souvenir? In Part toolbox, click Chamfer, click on the USB-C opening edges, set chamfer distance to something lower than your wall thickness, say, 0.6 mm (important!), and press Ok. Now your case has USB-C openings with chamfers that as if direct the plug into the receptacle – it’s the nicer and more professional way to do USB-C openings, after all.

Stepping Up


Once you get past “Hello World”, and want to speed your FreeCAD work tremendously, you will want to learn the keybinds. Once again, the key to designing quickly and comfortably is having one hand on keyboard and another hand on mouse, doesn’t matter if you’re doing PCBs or 3D models. And the keybinds are very mnemonic: “d” is dimension, “c” is coincident.

Another tip is saving your project often. Yet another one is keeping your FreeCAD models in Git, and even publishing them on GitHub/GitLab – sure, they’re binary files, but revision control is worth it even if you can’t easily diff the files. We could always use more public 3D models with FreeCAD sources. People not publishing their source files has long been a silent killer of ideas in the world of 3D printing, as opposed to whatever theories about patents might be floating around the web. If you want something designed to your needs, the quickest thing tends to be taking someone else’s project and modifying it, which is why we need for sharing culture so that we can all finally stop reinventing all the wheels our projects may require.

This is more than enough to ready you up for basic designs, if you ask me. Go get that case done, throw it on GitHub, and revel in knowing your board is that much less likely to accidentally short-circuit. It’s a very nice addition for a board intended to handle 100 W worth of power, and now it can also serve as a design example for your own needs. Next time, let’s talk about a number of good practices worth attending to if you want your FreeCAD models to last.


hackaday.com/2025/09/09/freeca…



È padre Joseph Farrell il nuovo priore generale degli Agostiniani. Lo hanno eletto nel pomeriggio i 73 frati capitolari riuniti a Roma per il 188° Capitolo generale dell’Ordine, in corso al Pontificio Istituto Patristico Augustinianum.



Un “universo straordinario, ricchissimo di umanità e significato quello dello spettacolo popolare” fatto di “volti, nomi, famiglie, comunità. Persone che vivono in movimento, ma che ci ricordano che la vita, in fondo, è sempre un pellegrinaggio”.


Offrire "gioia e senso dell'umorismo" agli altri è ciò che i fieranti e i circensi hanno “trasformato in una professione, considerandola una vocazione innata, donata e trasmessa da Dio di generazione in generazione.


Si è aperto oggi pomeriggio il seminario on line sul tema “Spettacolo Popolare, un mondo ambasciatore di gioia e di speranza”, promosso dal Dicastero dello sviluppo Umano ed Integrale e dalla Fondazione Migrantes che ha l'obiettivo - ha spiegato intr…


#Scuola, ulteriori 500 milioni di euro per #AgendaSud e #AgendaNord. Il Ministro, Giuseppe Valditara, ha firmato oggi due decreti per rafforzare i Piani, con l’obiettivo di ridurre i divari territoriali e sostenere le #scuole con fragilità negli appr…



Azzzz, arriva la temibilissima Stratus; ed io che pensavo fosse una nuova automobile...


‘Danger to Democracy’: 500+ Top Scientists Urge EU Governments to Reject ‘Technically Infeasible’ Chat Control


Over 500 of the world’s leading cryptographers, security researchers, and scientists from 34 countries have today delivered a devastating verdict on the EU’s proposed “Chat Control” regulation. An open letter published this morning declares the plan to mass-scan private messages is “technically infeasible,” a “danger to democracy,” and will “completely undermine” the security and privacy of all European citizens.

The scientific consensus comes just days before a crucial meeting of EU national experts on September 12 and weeks before a final vote planned for October 14. The letter massively increases pressure on a handful of undecided governments—notably Germany—whose votes will decide whether to form a blocking minority to stop the law.What is ‘Chat Control’?

The proposed EU regulation would legally require providers of services like WhatsApp, Signal, Instagram, E-Mail and others to scan all users’ private digital communications and chats—including text messages, photos, and videos. This automated, suspicionless scanning would apply even to end-to-end encrypted chats, forcing companies to bypass or break their own security protections. Any content flagged by the algorithms as potential child sexual abuse material (CSAM) would be automatically reported to authorities, effectively creating a system of constant mass surveillance for hundreds of millions of Europeans.

What the researchers highlight (key points)

The open letter from the scientific community systematically dismantles the core arguments for Chat Control, warning that the technology simply does not work and would create a surveillance infrastructure ripe for abuse:

  • A Recipe for Error and False Accusations: The scientists state it is “simply not feasible” to scan hundreds of millions of users’ private photos and messages with “an acceptable level of accuracy.” This would trigger a tsunami of false reports, placing innocent citizens—families sharing holiday photos, teenagers in consensual relationships, even doctors exchanging medical images—under automatic suspicion.
  • The End of Secure Encryption: The letter confirms that any form of scanning “inherently undermines the protections that end-to-end encryption is designed to guarantee.” It creates a backdoor on every phone and computer, a single point of failure that the scientists warn will become a “high-value target for threat actors.”
  • A Gift to Criminals, a Threat to the Innocent: Researchers confirm that detection algorithms are “easy to evade” by perpetrators with trivial technical modifications. The surveillance system would therefore fail to catch criminals while subjecting the entire population to invasive, error-prone scanning.
  • A Blueprint for Authoritarianism: The letter issues a stark warning that the proposal will create “unprecedented capabilities for surveillance, control, and censorship” with an inherent risk of “function creep and abuse by less democratic regimes.”

The Political Battlefield: Undecided Nations Hold the Key

The future of digital privacy in Europe hangs in the balance, with EU member states deeply divided. A blocking minority requires rejection or abstention by at least four Member States representing more than 35% of the EU population. Based on current stances, the population threshold would be reached if Germany joined the “not in favour” group alongside the seven governments already not in favour.

  • Pro-Surveillance Bloc (14): A coalition led by Denmark, Ireland, Spain, and Italy is pushing hard for the law. They are joined by Bulgaria, Croatia, Cyprus, France, Hungary, Latvia, Lithuania, Malta, Portugal, and Slovakia.
  • The Resistance (7): A firm group of critics includes Austria, Belgium, the Czech Republic, Finland, Luxembourg, the Netherlands, and Poland.
  • The Kingmakers (7): The deciding votes lie with Estonia, Germany, Greece, Romania, Slovenia, and Sweden. Germany’s position is pivotal. A ‘No’ vote or an abstention from Berlin would kill the bill.

Patrick Breyer, a digital rights advocate and former Member of the European Parliament for the Pirate Party, urges the undecided governments to heed the scientific evidence:

“This letter is a final, unambiguous warning from the people who build and secure our digital world. They are screaming that this law is a technical and ethical disaster. Any minister who votes for this is willfully ignoring the unanimous advice of experts. The excuse that this can be done without breaking encryption is a lie, and the myth that exempting encrypted services would solve all problems has now been proven wrong.

I am calling on the government of Germany, in particular, to show political courage, but also on France to reconsider its stance. Do not sacrifice the fundamental rights of 500 million citizens for a security fantasy that will not protect a single child. The choice is simple: stand with the experts and defend a free and secure internet for all – including children, or stand with the surveillance hardliners and deploy authoritarian China-style methods. Europe is at a crossroads, and your vote will define its digital future.”

The Pirate Party and the scientific community advocate for investing in proven child protection measures, such as strengthening law enforcement’s targeted investigation capabilities, designing communications apps more securely, funding victim support and prevention programs, and promoting digital literacy, rather than pursuing dangerous mass surveillance technologies.

Suggested questions for competent national ministries:

  • Encryption and national security: How will E2EE used by citizens, public authorities, businesses and critical services remain uncompromised under any detection mandates?
  • Accuracy and efficacy: What evidence shows image/URL scanning can achieve low false‑positive/negative rates at EU scale and resist trivial evasion? The German Federal Crime agency has reported an error rate of 48% in 2024 (page 18).
  • Scope and function creep: How does the government intend to ensure detection cannot be expanded or repurposed to broader surveillance/censorship in future (e.g., text/audio, political content)?
  • Child protection outcomes: Which evidence‑based measures (education, digital literacy, trauma‑informed victim support, faster handling of voluntary reports, targeted investigations) will be prioritised?

Key quotes from the open letter:

  • “On‑device detection, regardless of its technical implementation, inherently undermines the protections that end‑to‑end encryption is designed to guarantee.”
  • “Existing research confirms that state‑of‑the‑art detectors would yield unacceptably high false positive and false negative rates, making them unsuitable for large‑scale detection campaigns at the scale of hundreds of millions of users.”
  • “There is no machine‑learning algorithm that can [detect unknown CSAM] without committing a large number of errors … and all known algorithms are fundamentally susceptible to evasion.”

Further Information:

Upcoming Dates:


patrick-breyer.de/en/danger-to…

reshared this




Nuovo Maidan angloamericano sionista in Nepal

In Nepal, i manifestanti hanno incendiato il palazzo del Parlamento e la residenza del Primo Ministro. Diversi ministri del governo avrebbero lasciato la capitale e lo stesso Primo Ministro si sarebbe dimesso.

Le proteste in Nepal sono scoppiate dopo il divieto assoluto dei social media (Facebook, Instagram, WhatsApp, YouTube e altri). Le autorità hanno giustificato la misura sostenendo che le piattaforme di social media violavano le regole di registrazione, poiché il governo aveva chiesto l'apertura di uffici di rappresentanza in Nepal, richiesta che hanno ignorato. Allo stesso tempo, non è stata offerta alcuna alternativa nazionale ai social media e alle piattaforme di messaggistica vietate.

A seguito delle proteste sui "social media", almeno 19 persone sono morte. Più di 500 sono rimaste ferite in varia gravità. I dati non sono ancora definitivi.

La moglie dell'ex primo ministro nepalese Jhala Nath Khanal è morta a causa delle ustioni riportate quando i manifestanti l'hanno intrappolata nella sua residenza in fiamme, proprio come era successo alla casa dei sindacati di Odessa: è stata letteralmente bruciata viva.

Cellule dormienti dell'intelligence occidentale angloamericana-sionista si stanno muovendo in vari paesi: nei Balcani, con il tentato colpo di Stato in Serbia, ecc.

L'impero predatorio sionista anglo-americano, morente e in bancarotta, sta diventando molto pericoloso.

L'impunità di Israele, un regime di occupazione criminale, ne è un esempio: la stessa tattica-strategia fatta con l'Iran, nel momento di accordi; è successo con la false flag dell'attentato di ieri; e il bombardamento del Quatar di oggi.

Chi si fida ancora di Trump, sionista e guerrafondaio?

CONTANO I FATTI così come afferma sempre il grande giornalista Manlio Dinucci. Ovviamente lasciando perdere il fantasioso Gianfranco Landi, difensore accanito e spesso presente su Visione TV.



in quale data per la prima volta la cisgiordania ha "ospitato" militari israeliani e civili definiti "coloni"?

La presenza militare e civile israeliana in Cisgiordania ha avuto inizio in seguito alla Guerra dei Sei Giorni del giugno 1967.

In quell'anno, Israele conquistò la Cisgiordania, che era precedentemente sotto il controllo della Giordania. Subito dopo la fine del conflitto, le forze armate israeliane stabilirono un'occupazione militare del territorio.

Parallelamente, ebbero inizio i primi insediamenti civili israeliani. Già nel settembre 1967, il blocco di Etzion, vicino a Hebron, fu uno dei primi insediamenti a essere costruito nella Cisgiordania occupata, segnando l'inizio di una politica di colonizzazione che si sarebbe espansa nei decenni successivi.



esattamente, secondo quale logica, i soldati e di coloni israeliani in cisgiordania, non dovrebbero essere considerati una forma armata di occupazione, illegale secondo i dettami onu?


il mondo è pieno di muri e barriere. e non stanno diminuendo.


Anche a Napoli letti i nomi dei giornalisti uccisi a Gaza


@Giornalismo e disordine informativo
articolo21.org/2025/09/anche-a…
Mariam Abu Dagga, Hussam al-Masri, Mohammed Salama, Moaz Abu Taha e Ahmed Abu Aziz. Sono i nomi dei giornalisti uccisi nell’attacco all’ospedale Nasser dello scorso 25 agosto. Cinque nomi che si




la pace è una conquista dello spirito prima di tutto nel modo di fare politica e di comportarsi ogni giorno con gli altri esseri umani. non è dovuta e non è automatica. esistono i bulli contro i quali l'unica soluzione è la forza o almeno la deterrenza della forza. putin per chi non lo avesse capito è un bullo. chi va in giro a picchiare il giocatore che alla partire di calcio non ha lasciato spazio al proprio figlio è un bullo ed è un putin.


puoi anche decidere che i politici o certe categorie sono tutti dei parassiti senza utilità. se però tu non hai capacità di discernimento, o ascolti solo chi urla più forte, o non sai essere razionale e ascolti solo chi dà voce alla tua pancia, o ascolti chi propone di dare tutto a tutti, senza spiegare come ottenere o da chi le risorse, allora la causa della mala politica sei solo te e solo te puoi biasimare.

reshared this

in reply to simona

Una volta mi candidai per le comunali in un paesello (ero certo di diventare consigliere di minoranza: con 2 liste basta 1 voto) e un tipo a cui lo segnalai mi disse: "non voto, sono tutti ladri!".

"Vota me, sai che non rubo" risposi.

"E allora sei sciemo, che se ci vado io mi porto via anche le piastrelle del cesso!".

A questo punto chi sarebbero i ladri?




In Qatar c'è la più grande base militare USA nel Vicino Oriente. Gli USA hanno dato il via libera ad Israele per attaccare il Qatar, dove si stava tenendo un vertice dell'ala politica in esilio di Hamas. Il Qatar, a sua volta, non reagirà in alcun modo (salvo alcune dichiarazioni di circostanza) perché in larga parte è complice di USA e Israele. Tuttavia, questo dimostra che nessun è realmente al sicuro. Negli ultimi due anni Israele ha bombardato Siria, Libano, Yemen, Iran e Qatar (senza considerare, ovviamente, la distruzione genocida di Gaza e la silenziosa occupazione di Cipro, dove le basi britanniche vengono utilizzate a suo piacimento dall'IDF, e dove forse si prepara un attacco alla zona occupata dalla Turchia e priva di riconoscimento internazionale, cosa che renderebbe vano il ricorso all'articolo V della statuto NATO). Ribadisco, Israele rappresenta una minaccia per tutti i popoli rivieraschi del Mediterraneo. Rappresenta, insieme al suo padrino d'oltreoceano, il più evidente ostacolo alla sovranità europea su questo specchio d'acqua ed alla costruttiva cooperazione tra i popoli europei e nordafricani. Deve essere fermato prima che sia troppo tardi.

Daniele Perra



India potenza navale entro il 2040? Ecco la strategia di Nuova Delhi per inserirsi tra Cina e Usa

@Notizie dall'Italia e dal mondo

Il ministero della Difesa indiano ha recentemente pubblicato la Technology perspective capability roadmap (Tpcr) 2025, un documento che sviscera le priorità delle Forze armate di Nuova Delhi in materia di tecnologie emergenti



Difesa e innovazione. Il Dsei 2025 mette in mostra la forza dell’industria italiana

@Notizie dall'Italia e dal mondo

Ha preso il via oggi a Londra il Defence and security equipment international (Dsei), considerato il più importante salone europeo e uno dei principali appuntamenti mondiali dedicati a difesa e sicurezza. L’edizione 2025, che proseguirà fino al 12




Anduril, Palantir e la nuova Rivet in corsa per rivoluzionare il kit militare americano

@Notizie dall'Italia e dal mondo

Nei primi giorni di settembre l’esercito statunitense ha avviato il programma Soldier borne mission command (Sbmc), concepito per superare i limiti del precedente Integrated visual augmentation system (Ivas) sviluppato da Microsoft. Sbmc è un



NEPAL. Il premier si dimette in seguito alle proteste dei giovani


@Notizie dall'Italia e dal mondo
Dopo le dimissioni del premier Oli e del ministro dell’Interno, la protesta guidata dalla Generazione Z non si ferma: i giovani chiedono lo scioglimento del Parlamento, dimissioni di massa e nuove elezioni per voltare pagina nella politica del Nepal
L'articolo NEPAL. Il premier si



Stato dell’Unione 2025, von der Leyen in bilico tra ambizione e contestazioni

L'articolo proviene da #Euractiv Italia ed è stato ricondiviso sulla comunità Lemmy @Intelligenza Artificiale
Ursula von der Leyen si prepara a pronunciare domani a Strasburgo il suo primo discorso sullo Stato dell’Unione europea del secondo mandato. Un passaggio che



Tutti al corteo a difesa del nostro futuro. Ci vediamo dalle 17.30 al sito anche per raccogliere la firma di chi ancora non l'ha messa.
Venite tutti!


Israele attacca il Qatar. Bombe contro la leadership di Hamas durante i negoziati


@Notizie dall'Italia e dal mondo
Attacco senza precedenti durante i colloqui di cessate il fuoco: il Qatar denuncia una grave violazione della sua sovranità
L'articolo Israele attacca il Qatar. Bombe contro la leadership di Hamas durante i negoziati proviene da Pagine Esteri.



Così il Regno Unito trasforma la difesa in motore di potenza economica

@Notizie dall'Italia e dal mondo

La difesa come motore di crescita economica e leva geopolitica. È l’assunto da cui parte la nuova Defence Industrial Strategy 2025 del governo britannico, il documento che ridisegna la relazione tra Forze Armate, industria e politica estera in un’epoca di minacce crescenti.




Qualche settimana fa avevo letto un messaggio relativo ad una tastiera Open Source per Android.

Purtroppo non l'ho salvato e quindi non lo ritrovo più.

Mi dareste un paio di alternative a Gboard che avete provato voi stessi?

La caratteristica che mi interessa di più su una tastiera è il completamento delle parole, in tre lingue almeno (IT, EN, FR).

Mi piacerebbe che si potesse dettare il testo.

Grazie.



Öcalan: il Rojava è la mia linea rossa

Pervin Buldan, esponente della delegazione di Imralı, ha affermato che Öcalan ha ripetutamente sottolineato che “il Rojava è la mia linea rossa”, aggiungendo: “Escludere i curdi ed eliminare i loro successi non porterà alcun beneficio alla Turchia”. Pervin Buldan della delegazione di Imralı del partito DEM, ha parlato a JINTV del processo di pace e della società democratica e dell’ultimo incontro con Öcalan.

Öcalan: il Rojava è la nostra linea rossa

Pervin Buldan ha affermato che Abdullah Öcalan ha espresso valutazioni sulla Siria settentrionale e orientale e sugli sviluppi in Siria. Ha spiegato che Öcalan ha discusso di questi temi con la delegazione statale, aggiungendo: “Con noi, con la delegazione del DEM, ha parlato solo di politica turca, ma so che lo ha ripetuto più volte: ‘Siria e Rojava sono la mia linea rossa. Per me, quel posto è diverso'”.

Ha sollevato questo punto sulla Siria più volte. Oltre a ciò, tuttavia, vorrei sottolineare che non ha espresso con noi valutazioni sulla Siria e sul Rojava. Ne ha discusso principalmente con la delegazione statale, ha dibattuto la questione lì e ha persino affermato che, se si fossero presentate l’opportunità e le circostanze avrebbe ritenuto importante stabilire una comunicazione anche con loro.

Sì, ha sottolineato più volte l’importanza della comunicazione con il Rojava. Ha espresso il desiderio di parlare con loro, dibattere con loro e valutare insieme quale percorso intraprendere e quale decisione prendere. “Questo non è ancora avvenuto, ma se in futuro si faranno progressi e si creerà un’opportunità del genere, magari attraverso incontri e contatti con i funzionari del Rojava, crediamo che la questione sarà risolta più facilmente”.

Pervin Buldan ha anche richiamato l’attenzione sulle dichiarazioni del governo sulla Siria settentrionale e orientale, commentando: “La Turchia, in questo senso, sulla questione del Rojava e della Siria, deve schierarsi dalla parte del popolo curdo”.

Escludere i curdi, lanciare un’operazione contro di loro o vanificare i successi del popolo curdo non porta alcun vantaggio alla Turchia, e nemmeno i curdi in Turchia lo accetteranno. Questo deve essere compreso chiaramente e credo che sia necessario pensare in modo più razionale e prendere decisioni corrette per risolvere la questione attraverso il giusto percorso e metodo.

Pertanto, anche la Turchia monitora attentamente gli sviluppi in Siria, gli accordi, i negoziati con il governo di Damasco, ecc. Ma i curdi sono estremamente sensibili a questo tema. Il Rojava è la zona più sensibile del popolo curdo. Quindi, non importa quanti passi facciamo verso la democratizzazione in Turchia, anche la più piccola perdita in Rojava, o un’operazione militare in quella zona, causerebbe una grande devastazione tra il popolo curdo. Un simile approccio non sarebbe accettato. Nessuno lo accetterebbe. Soprattutto, il signor Öcalan non lo accetterebbe. Quindi non importa quanti passi facciamo verso la democratizzazione in Turchia, anche la più piccola perdita in Rojava, o un’operazione militare in quella zona, causerebbe una grande devastazione tra il popolo curdo. Un simile approccio non sarebbe accettato. Nessuno lo accetterebbe. Soprattutto, il signor Öcalan non lo accetterebbe.

Credo che se la Turchia affronta questa questione con un’intesa che la vede al fianco del popolo curdo, ne rispetta i successi e ne riconosce il diritto a vivere in ogni regione con le proprie conquiste, la propria lingua, identità e cultura, e cerca di risolvere la questione su basi democratiche, legali e costituzionali, allora sarà la Turchia stessa a guadagnarci. In questo modo, non partendo da una situazione di perdita o di perdita, ma partendo da una situazione di vittoria e di aiuto agli altri, una comprensione e un consenso comuni possono effettivamente risolvere questa questione.

Tre concetti chiave

Pervin Buldan ha affermato che Öcalan ha sottolineato tre concetti chiave: “Possiamo pensare alle questioni della società democratica, della pace e dell’integrazione come a un unico pacchetto. Considerarle separatamente o scollegate l’una dall’altra sarebbe un errore, sarebbe sbagliato. Öcalan ha sottolineato l’importanza di adottare misure rapide e sincronizzate che possano intrecciare tutti questi aspetti e di garantire che l’integrazione diventi finalmente realtà”.

Mettiamola così: è stata istituita una commissione. Questa commissione ha iniziato i suoi lavori e il suo vero scopo è quello di approvare le leggi il più rapidamente possibile. Perché senza leggi sull’integrazione, nulla può essere attuato. Certo, possiamo parlare di pace, possiamo parlare di democratizzazione, possiamo certamente discutere delle ingiustizie e dell’illegalità in Turchia e di come si possano approvare nuove leggi per affrontarle. Ma l’integrazione è qualcosa di molto diverso.

Oggi ci sono migliaia di persone sulle montagne con le armi in mano. Sì, simbolicamente si è svolta una cerimonia di scioglimento. Il PKK ha dichiarato il suo scioglimento. Ma ci sono ancora persone armate. Ora, queste persone armate devono deporre le armi e tornare in Turchia, e le barriere che impediscono loro di partecipare alla politica democratica devono essere rimosse. Questo può diventare realtà solo attraverso le leggi che emergeranno dalla commissione.

@Politica interna, europea e internazionale

reshared this



Il neocolonialismo della sorveglianza! Pakistan: la macchina della sorveglianza di massa e della censura è alimentata da aziende cinesi, europee, emiratine e nordamericane

L'espansione illegale della sorveglianza di massa e della censura in Pakistan è alimentata da una rete di aziende con sede in Germania, Francia, Emirati Arabi Uniti (EAU), Cina, Canada e Stati Uniti, ha dichiarato oggi Amnesty International nel nuovo rapporto "Shadows of Control". L'indagine, durata un anno, è stata condotta in collaborazione con Paper Trail Media, DER STANDARD, Follow the Money, The Globe and Mail, Justice For Myanmar, [b]InterSecLab[/b] e Tor Project.

L'indagine svela come le autorità pakistane abbiano ottenuto tecnologie da aziende straniere, attraverso una catena di fornitura globale segreta di sofisticati strumenti di sorveglianza e censura, in particolare il nuovo firewall (Web Monitoring System [WMS 2.0]) e il Lawful Intercept Management System (LIMS).

Il rapporto documenta come il firewall WMS si sia evoluto nel tempo, inizialmente utilizzando la tecnologia fornita dall'azienda canadese Sandvine (ora AppLogic Networks). In seguito alla cessione di Sandvine nel 2023, è stata utilizzata una nuova tecnologia della cinese Geedge Networks, che utilizza componenti hardware e software forniti da Niagara Networks dagli Stati Uniti e Thales dalla Francia, per creare una nuova versione del firewall. Il Lawful Intercept Management System (LIMS) utilizza la tecnologia dell'azienda tedesca Utimaco, tramite un'azienda emiratina chiamata Datafusion.

"Il sistema di monitoraggio web e il sistema di gestione delle intercettazioni legali del Pakistan operano come torri di guardia, spiando costantemente la vita dei cittadini comuni. In Pakistan, messaggi, email, chiamate e accesso a internet sono tutti sotto esame. Ma le persone non hanno idea di questa sorveglianza costante e della sua portata incredibile. Questa realtà distopica è estremamente pericolosa perché opera nell'ombra, limitando gravemente la libertà di espressione e l'accesso alle informazioni", ha dichiarato Agnès Callamard, Segretaria generale di Amnesty International.

"La sorveglianza di massa e la censura in Pakistan sono state rese possibili dalla collusione di un gran numero di attori aziendali che operano in giurisdizioni diverse come Francia, Germania, Canada, Cina ed Emirati Arabi Uniti. Si tratta di una vasta e redditizia economia di oppressione, resa possibile da aziende e Stati che non rispettano i propri obblighi ai sensi del diritto internazionale.


amnesty.org/en/latest/news/202…

@Etica Digitale (Feddit)



Oggi, 9 settembre, nel 1966, la strage di Malga Sasso (Brennero). Tre finanzieri uccisi in un attentato dinamitardo

Negli anni ’60 la protesta autonimistica del Befreiungsausschuss Südtirol (BAS), (“Comitato di Liberazione del Sudtirolo”), si tradusse in una serie di azioni terroristiche contro infrastrutture e simboli della presenza italiana. La strage della caserma della Guardia di Finanza di Malga Sasso si inserisce in questa lunga catena di attacchi.
Nell’esplosione morirono tre finanzieri: Franco Petrucci, di anni 28, tenente, originario di Montecastrilli (TR), Heribert Volgger, 27enne vicebrigadiere, sudtirolese di lingua tedesca e Martino Cossu, appena 20enne.

storiachepassione.it/accadde-o…

@Storia

#acceddeoggi
#otd
#guardiadifinanza
#malgasasso

in reply to storiaweb

L'immagine mostra tre fotografie in bianco e nero di giovani uomini in uniforme militare. La prima fotografia, a sinistra, ritrae un giovane con capelli scuri e corti, indossando una divisa con epaulette e una cravatta. La seconda fotografia, al centro, mostra un giovane con capelli scuri e corti, indossando una divisa con decorazioni sul collo. La terza fotografia, a destra, ritrae un giovane con un berretto militare decorato con un simbolo, indossando una divisa con epaulette. Tutti e tre i giovani hanno un'espressione seria e diretta verso la telecamera.

Fornito da @altbot, generato localmente e privatamente utilizzando Ovis2-8B

🌱 Energia utilizzata: 0.196 Wh



Ringraziamo chi vota gente così seria e affidabile, è proprio ciò di cui c'è bisogno nel governo di un paese che voglia risollevarsi un pochino.


Quando iniziano i cantieri del ponte sullo Stretto? - Il Post
https://www.ilpost.it/2025/09/09/data-inizio-cantieri-ponte-stretto-messina/?utm_source=flipboard&utm_medium=activitypub

Pubblicato su News @news-ilPost




Cosa può fare (da sola) l’Italia in Libano. Parla il gen. Camporini

@Notizie dall'Italia e dal mondo

Le tensioni non accennano a ridursi in Medio Oriente. In Libano, nuovi incidenti hanno coinvolto la missione Onu Unifil, cui partecipano molti soldati italiani, e hanno riacceso il dibattito sul futuro della presenza internazionale nel Paese. Il Consiglio di sicurezza ha deliberato il ritiro



Global Sumud Flotilla. Un incendio danneggia un’imbarcazione, gli attivisti accusano Israele


@Notizie dall'Italia e dal mondo
Un incendio ha danneggiato la Family Boat nel porto tunisino di Sidi Bou Said. Gli attivisti denunciano: "è stato un drone a sganciare un ordigno". Le autorità tunisine smentiscono
L'articolo Global Sumud Flotilla. Un



L’olandese ASML investe 1,3 miliardi in Mistral AI: l’Europa punta a rafforzare la sovranità tecnologica

L'articolo proviene da #Euractiv Italia ed è stato ricondiviso sulla comunità Lemmy @Intelligenza Artificiale
Il colosso olandese ASML, leader mondiale nella produzione di macchinari per semiconduttori, ha annunciato un



Perché l’azienda di tecnologia pubblicitaria PubMatic cita in giudizio Google

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Dopo la serie di sanzioni della scorsa settimana – tra cui la maxi-multa da 2,95 miliardi inflitta dall’Ue – Alphabet, la casa madre di Google, finisce di nuovo sotto accusa: la