Salta al contenuto principale



La presidenza Trump non è follia, è la conseguenza della politica dello spettacolo
possibile.com/trump-postman/?u…
Il futuro non è scritto, diceva Postman. Ed è vero anche oggi: dipende da come useremo i mezzi di comunicazione, se come strumenti di intrattenimento o come occasioni di pensiero. La differenza non è secondaria. Da essa dipende la qualità della nostra democrazia.
L'articolo La presidenza Trump non è follia, è la


Flotilla verso la Striscia. Scotto (Pd): “Nottata in allerta. Abbordaggio sarebbe illegale”

[quote]ROMA – Nella notte tra martedì 30 settembre e mercoledì 1 ottobre diverse barche della Global Sumud Flotilla sono state avvicinate da alcune imbarcazioni non identificate. A bordo c’era anche…
L'articolo Flotilla verso la Striscia. Scotto (Pd): “Nottata in



Da tempo sto provando a ridurre le spese e cerco qualcuno con cui condividere uno spazio che ho affittatto come studio musicale.

Rispondo alla richiesta di questa band che cerca una sala prove.

Mi contatta Enrico, dicendomi che sono in 5, che hanno una cover band di sigle di anime e musiche dei videogiochi.
Mi rassicura sul fatto che sono tutti molto tranquilli e riservati e che fuori dalle prove non li vedrò mai in saletta.
Mi dice che assolutamente non faranno feste in studio e casini vari.

Molto bene dico e mi accordo per fargli vedere il posto e lasciargli le chiavi.

Nel pomeriggio viene a prenderle un ragazzo che sembrava un po' la fotocopia dell'altro: pallidissimo, con i capelli di un nero corvino e gli occhiali da vista spessi. Uguale a st'altro.
Fatalità anche lui si chiama Enrico.

Enrico mi dice che siccome con l'altro Enrico non si sono capiti verrà in studio un'ora dopo. Mi chiede se per favore gli posso lasciare le chiavi da qualche parte.



An FPGA-Based Mechanical Keyboard


You can buy all kinds of keyboards these days, from basic big-brand stuff to obscure mechanical delicacies from small-time builders. Or, you can go the maker route, and build your own. That’s precisely what [Lambert Sartory] did with their Clavier build.

This build goes a bit of a different route to many other DIY keyboards out there, in that [Lambert] was keen to build it around an FPGA instead of an off-the-shelf microcontroller. To that end, the entire USB HID stack was implemented in VHDL on a Lattice ECP5 chip. It was a heavy-duty way to go, but it makes the keyboard quite unique compared to those that just rely on existing HID libraries to do the job. This onboard hardware also allowed [Lambert] to include JTAG, SPI, I2C, and UART interfaces right on the keyboard, as well as a USB hub for good measure.

As for the mechanical design, it’s a full-size 105-key ISO keyboard with one bonus key for good measure. That’s the coffee key, which either locks the attached computer when you’re going for a break, or resets the FPGA with a long press just in case it’s necessary. It’s built with Cherry MX compatible switches, has N-key rollover capability, and a mighty 1000 Hz polling rate. If you can exceed that by hand, you’re some sort of superhuman.

The great thing about building your own keyboard is you can put in whatever features you desire. If you’re whipping up your own neat interface devices, don’t hesitate to let us know!


hackaday.com/2025/10/01/an-fpg…



Forensic journey: hunting evil within AmCache



Introduction


When it comes to digital forensics, AmCache plays a vital role in identifying malicious activities in Windows systems. This artifact allows the identification of the execution of both benign and malicious software on a machine. It is managed by the operating system, and at the time of writing this article, there is no known way to modify or remove AmCache data. Thus, in an incident response scenario, it could be the key to identifying lost artifacts (e.g., ransomware that auto-deletes itself), allowing analysts to search for patterns left by the attacker, such as file names and paths. Furthermore, AmCache stores the SHA-1 hashes of executed files, which allows DFIR professionals to search public threat intelligence feeds — such as OpenTIP and VirusTotal — and generate rules for blocking this same file on other systems across the network.

This article presents a comprehensive analysis of the AmCache artifact, allowing readers to better understand its inner workings. In addition, we present a new tool named “AmCache-EvilHunter“, which can be used by any professional to easily parse the Amcache.hve file and extract IOCs. The tool is also able to query the aforementioned intelligence feeds to check for malicious file detections, this level of built-in automation reduces manual effort and speeds up threat detection, which is of significant value for analysts and responders.

The importance of evidence of execution


Evidence of execution is fundamentally important in digital forensics and incident response, since it helps investigators reconstruct how the system was used during an intrusion. Artifacts such as Prefetch, ShimCache, and UserAssist offer clues about what was executed. AmCache is also a robust artifact for evidencing execution, preserving metadata that indicates a file’s presence and execution, even if the file has been deleted or modified. An advantage of AmCache over other Windows artifacts is that unlike them, it stores the file hash, which is immensely useful for analysts, as it can be used to hunt malicious files across the network, increasing the likelihood of fully identifying, containing, and eradicating the threat.

Introduction to AmCache


Application Activity Cache (AmCache) was first introduced in Windows 7 and fully leveraged in Windows 8 and beyond. Its purpose is to replace the older RecentFileCache.bcf in newer systems. Unlike its predecessor, AmCache includes valuable forensic information about program execution, executed binaries and loaded drivers.

This artifact is stored as a registry hive file named Amcache.hve in the directory C:\Windows\AppCompat\Programs. The metadata stored in this file includes file paths, publisher data, compilation timestamps, file sizes, and SHA-1 hashes.

It is important to highlight that the AmCache format does not depend on the operating system version, but rather on the version of the libraries (DLLs) responsible for filling the cache. In this way, even Windows systems with different patch levels could have small differences in the structure of the AmCache files. The known libraries used for filling this cache are stored under %WinDir%\System32 with the following names:

  • aecache.dll
  • aeevts.dll
  • aeinv.dll
  • aelupsvc.dll
  • aepdu.dll
  • aepic.dll

It is worth noting that this artifact has its peculiarities and limitations. The AmCache computes the SHA-1 hash over only the first 31,457,280 bytes (≈31 MB) of each executable, so comparing its stored hash online can fail for files exceeding this size. Furthermore, Amcache.hve is not a true execution log: it records files in directories scanned by the Microsoft Compatibility Appraiser, executables and drivers copied during program execution, and GUI applications that required compatibility shimming. Only the last category reliably indicates actual execution. Items in the first two groups simply confirm file presence on the system, with no data on whether or when they ran.

In the same directory, we can find additional LOG files used to ensure Amcache.hve consistency and recovery operations:

  • C:\Windows\AppCompat\Programs\Amcache.hve.*LOG1
  • C:\Windows\AppCompat\Programs\Amcache.hve.*LOG2

The Amcache.hve file can be collected from a system for forensic analysis using tools like Aralez, Velociraptor, or Kape.

Amcache.hve structure


The Amcache.hve file is a Windows Registry hive in REGF format; it contains multiple subkeys that store distinct classes of data. A simple Python parser can be implemented to iterate through Amcache.hve and present its keys:
#!/usr/bin/env python3

import sys
from Registry.Registry import Registry

hive = Registry(str(sys.argv[1]))
root = hive.open("Root")

for rec in root.subkeys():
print(rec.name())
The result of this parser when executed is:

AmCache keys
AmCache keys

From a DFIR perspective, the keys that are of the most interest to us are InventoryApplicationFile, InventoryApplication, InventoryDriverBinary, and InventoryApplicationShortcut, which are described in detail in the following subsections.

InventoryApplicationFile


The InventoryApplicationFile key is essential for tracking every executable discovered on the system. Under this key, each executable is represented by its own uniquely named subkey, which stores the following main metadata:

  • ProgramId: a unique hash generated from the binary name, version, publisher, and language, with some zeroes appended to the beginning of the hash
  • FileID: the SHA-1 hash of the file, with four zeroes appended to the beginning of the hash
  • LowerCaseLongPath: the full lowercase path to the executable
  • Name: the file base name without the path information
  • OriginalFileName: the original filename as specified in the PE header’s version resource, indicating the name assigned by the developer at build time
  • Publisher: often used to verify if the source of the binary is legitimate. For malware, this subkey is usually empty
  • Version: the specific build or release version of the executable
  • BinaryType: indicates whether the executable is a 32-bit or 64-bit binary
  • ProductName: the ProductName field from the version resource, describing the broader software product or suite to which the executable belongs
  • LinkDate: the compilation timestamp extracted from the PE header
  • Size: the file size in bytes
  • IsOsComponent: a boolean flag that specifies whether the executable is a built-in OS component or a third-party application/library

With some tweaks to our original Python parser, we can read the information stored within this key:
#!/usr/bin/env python3

import sys
from Registry.Registry import Registry

hive = Registry(sys.argv[1])
root = hive.open("Root")

subs = {k.name(): k for k in root.subkeys()}
parent = subs.get("InventoryApplicationFile")

for rec in parent.subkeys():
vals = {v.name(): v.value() for v in rec.values()}
print("{}\n{}\n\n-----------\n".format(rec, vals))

InventoryApplicationFile subkeys
InventoryApplicationFile subkeys

We can also use tools like Registry Explorer to see the same data in a graphical way:

InventoryApplicationFile inspected through Registry Explorer
InventoryApplicationFile inspected through Registry Explorer

As mentioned before, AmCache computes the SHA-1 hash over only the first 31,457,280 bytes (≈31 MB). To prove this, we did a small experiment, during which we got a binary smaller than 31 MB (Aralez) and one larger than this value (a custom version of Velociraptor). For the first case, the SHA-1 hash of the entire binary was stored in AmCache.

First AmCache SHA-1 storage scenario
First AmCache SHA-1 storage scenario

For the second scenario, we used the dd utility to extract the first 31 MB of the Velociraptor binary:

Stripped binary
Stripped binary

When checking the Velociraptor entry on AmCache, we found that it indeed stored the SHA-1 hash calculated only for the first 31,457,280 bytes of the binary. Interestingly enough, the Size value represented the actual size of the original file. Thus, relying only on the file hash stored on AmCache for querying threat intelligence portals may be not enough when dealing with large files. So, we need to check if the file size in the record is bigger than 31,457,280 bytes before searching threat intelligence portals.

Second AmCache SHA-1 storage scenario
Second AmCache SHA-1 storage scenario

Additionally, attackers may take advantage of this characteristic to purposely generate large malicious binaries. In this way, even if investigators find that a malware was executed/present on a Windows system, the actual SHA-1 hash of the binary will still be unknown, making it difficult to track it across the network and gathering it from public databases like VirusTotal.

InventoryApplicationFile – use case example: finding a deleted tool that was used


Let’s suppose you are searching for a possible insider threat. The user denies having run any suspicious programs, and any suspicious software was securely erased from disk. But in the InventoryApplicationFile, you find a record of winscp.exe being present in the user’s Downloads folder. Even though the file is gone, this tells you the tool was on the machine and it was likely used to transfer files before being deleted. In our incident response practice, we have seen similar cases, where this key proved useful.

InventoryApplication


The InventoryApplication key records details about applications that were previously installed on the system. Unlike InventoryApplicationFile, which logs every executable encountered, InventoryApplication focuses on those with installation records. Each entry is named by its unique ProgramId, allowing straightforward linkage back to the corresponding InventoryApplicationFile key. Additionally, InventoryApplication has the following subkeys of interest:

  • InstallDate: a date‑time string indicating when the OS first recorded or recognized the application
  • MsiInstallDate: present only if installed via Windows Installer (MSI); shows the exact time the MSI package was applied, sourced directly from the MSI metadata
  • UninstallString: the exact command line used to remove the application
  • Language: numeric locale identifier set by the developer (LCID)
  • Publisher: the name of the software publisher or vendor
  • ManifestPath: the file path to the installation manifest used by UWP or AppX/MSIX apps

With a simple change to our parser, we can check the data contained in this key:
<...>
parent = subs.get("InventoryApplication")
<...>

InventoryApplication subkeys
InventoryApplication subkeys

When a ProgramId appears both here and under InventoryApplicationFile, it confirms that the executable is not merely present or executed, but was formally installed. This distinction helps us separate ad-hoc copies or transient executions from installed software. The following figure shows the ProgramId of the WinRAR software under InventoryApplicationFile.

When searching for the ProgramId, we find an exact match under InventoryApplication. This confirms that WinRAR was indeed installed on the system.

Another interesting detail about InventoryApplication is that it contains a subkey named LastScanTime, which is stored separately from ProgramIds and holds a value representing the last time the Microsoft Compatibility Appraiser ran. This is a scheduled task that launches the compattelrunner.exe binary, and the information in this key should only be updated when that task executes. As a result, software installed since the last run of the Appraiser may not appear here. The LastScanTime value is stored in Windows FileTime format.

InventoryApplication LastScanTime information
InventoryApplication LastScanTime information

InventoryApplication – use case example: spotting remote access software


Suppose that during an incident response engagement, you find an entry for AnyDesk in the InventoryApplication key (although the application is not installed anymore). This means that the attacker likely used it for remote access and then removed it to cover their tracks. Even if wiped from disk, this key proves it was present. We have seen this scenario in real-world cases more than once.

InventoryDriverBinary


The InventoryDriverBinary key records every kernel-mode driver that the system has loaded, providing the essential metadata needed to spot suspicious or malicious drivers. Under this key, each driver is captured in its own uniquely named subkey and includes:

  • FileID: the SHA-1 hash of the driver binary, with four zeroes appended to the beginning of the hash
  • LowerCaseLongPath: the full lowercase file path to the driver on disk
  • DigitalSignature: the code-signing certificate details. A valid, trusted signature helps confirm the driver’s authenticity
  • LastModified: the file’s last modification timestamp from the filesystem metadata, revealing when the driver binary was most recently altered on disk

Because Windows drivers run at the highest privilege level, they are frequently exploited by malware. For example, a previous study conducted by Kaspersky shows that attackers are exploiting vulnerable drivers for killing EDR processes. When dealing with a cybersecurity incident, investigators correlate each driver’s cryptographic hash, file path, signature status, and modification timestamp. That can help in verifying if the binary matches a known, signed version, detecting any tampering by spotting unexpected modification dates, and flagging unsigned or anomalously named drivers for deeper analysis. Projects like LOLDrivers help identify vulnerable drivers in use by attackers in the wild.

InventoryDriverBinary inspection
InventoryDriverBinary inspection

In addition to the InventoryDriverBinary, AmCache also provides the InventoryApplicationDriver key, which keeps track of all drivers that have been installed by specific applications. It includes two entries:

  • DriverServiceName, which identifies the name of the service linked to the installed driver; and
  • ProgramIds, which lists the program identifiers (corresponding to the key names under InventoryApplication) that were responsible for installing the driver.

As shown in the figure below, the ProgramIds key can be used to track the associated program that uses this driver:

Checking program information by ProgramIds
Checking program information by ProgramIds

InventoryDriverBinary – use case example: catching a bad driver


If the system was compromised through the abuse of a known vulnerable or malicious driver, you can use the InventoryDriverBinary registry key to confirm its presence. Even if the driver has been removed or hidden, remnants in this key can reveal that it was once loaded, which helps identify kernel-level compromises and supporting timeline reconstruction during the investigation. This is exactly how the AV Killer malware was discovered.

InventoryApplicationShortcut


This key contains entries for .lnk (shortcut) files that were present in folders like each user’s Start Menu or Desktop. Within each shortcut key, the ShortcutPath provides the absolute path to the LNK file at the moment of discovery. The ShortcutTargetPath shows where the shortcut pointed. We can also search for the ProgramId entry within the InventoryApplication key using the ShortcutProgramId (similar to what we did for drivers).

InventoryApplicationShortcut key
InventoryApplicationShortcut key

InventoryApplicationShortcut – use case example: confirming use of a removed app


You find that a suspicious program was deleted from the computer, but the user claims they never ran it. The InventoryApplicationShortcut key shows a shortcut to that program was on their desktop and was accessed recently. With supplementary evidence, such as that from Prefetch analysis, you can confirm the execution of the software.

AmCache key comparison


The table below summarizes the information presented in the previous subsections, highlighting the main information about each AmCache key.

KeyContainsIndicates execution?
InventoryApplicationFileMetadata for all executables seen on the system.Possibly (presence = likely executed)
InventoryApplicationMetadata about formally installed software.No (indicates installation, not necessarily execution)
InventoryDriverBinaryMetadata about loaded kernel-mode drivers.Yes (driver was loaded into memory)
InventoryApplicationShortcutInformation about .lnk files.Possibly (combine with other data for confirmation)

AmCache-EvilHunter


Undoubtedly Amcache.hve is a very important forensic artifact. However, we could not find any tool that effectively parses its contents while providing threat intelligence for the analyst. With this in mind, we developed AmCache-EvilHunter a command-line tool to parse and analyze Windows Amcache.hve registry hives, identify evidence of execution, suspicious executables, and integrate Kaspersky OpenTIP and VirusTotal lookups for enhanced threat intelligence.

AmCache-EvilHunter is capable of processing the Amcache.hve file and filter records by date range (with the options --start and --end). It is also possible to search records using keywords (--search), which is useful for searching for known naming conventions adopted by attackers. The results can be saved in CSV (--csv) or JSON (--json) formats.

The image below shows an example of execution of AmCache-EvilHunter with these basic options, by using the following command:
amcache-evilhunter -i Amcache.hve --start 2025-06-19 --end 2025-06-19 --csv output.csv
The output contains all applications that were present on the machine on June 19, 2025. The last column contains information whether the file is an operating system component, or not.

Basic usage of AmCache-EvilHunter
Basic usage of AmCache-EvilHunter

CSV result
CSV result

Analysts are often faced with a large volume of executables and artifacts. To narrow down the scope and reduce noise, the tool is able to search for known suspicious binaries with the --find-suspicious option. The patterns used by the tool include common malware names, Windows processes containing small typos (e.g., scvhost.exe), legitimate executables usually found in use during incidents, one-letter/one-digit file names (such as 1.exe, a.exe), or random hex strings. The figure below shows the results obtained by using this option; as highlighted, one svchost.exe file is part of the operating system and the other is not, making it a good candidate for collection and analysis if not deleted.

Suspicious files identification
Suspicious files identification

Malicious files usually do not include any publisher information and are definitely not part of the default operating system. For this reason, AmCache-EvilHunter also ships with the --missing-publisher and --exclude-os options. These parameters allow for easy filtering of suspicious binaries and also allow fast threat intelligence gathering, which is crucial during an incident.

Another important feature that distinguishes our tool from other proposed approaches is that AmCache-EvilHunter can query Kaspersky OpenTIP (--opentip ) and VirusTotal (--vt) for hashes it identifies. In this way, analysts can rapidly gain insights into samples to decide whether they are going to proceed with a full analysis of the artifact or not.

Threat intel lookup
Threat intel lookup

Binaries of the tool are available on our GitHub page for both Linux and Windows systems.

Conclusion


Amcache.hve is a cornerstone of Windows forensics, capturing rich metadata, such as full paths, SHA-1 hashes, compilation timestamps, publisher and version details, for every executable that appears on a system. While it does not serve as a definitive execution log, its strength lies in documenting file presence and paths, making it invaluable for spotting anomalous binaries, verifying trustworthiness via hash lookups against threat‐intelligence feeds, and correlating LinkDate values with known attack campaigns.

To extract its full investigative potential, analysts should merge AmCache data with other artifacts (e.g., Prefetch, ShimCache, and Windows event logs) to confirm actual execution and build accurate timelines. Comparing InventoryApplicationFile entries against InventoryApplication reveals whether a file was merely dropped or formally installed, and identifying unexpected driver records can expose stealthy rootkits and persistence mechanisms. Leveraging parsers like AmCache-EvilHunter and cross-referencing against VirusTotal or proprietary threat databases allows IOC generation and robust incident response, making AmCache analysis a fundamental DFIR skill.


securelist.com/amcache-forensi…



Oggi 1° ottobre, memoria liturgica di Santa Teresa di Lisieux, il vescovo di Macerata Nazzareno Marconi ha presieduto il rito di benedizione per l’apertura del cantiere di restauro della chiesa di Santa Maria delle Grazie a Tolentino.


Porting a Fortran Flight Simulator to Unity3D


There’s an old saying (paraphrasing a quote attributed to Hoare): “I don’t know what language scientists will use in the future, but I know it will be called Fortran.” The truth is, there is a ton of very sophisticated code in Fortran, and if you want to do something more modern, it is often easier to borrow it than to reinvent the wheel. When [Valgriz] picked up a textbook on aircraft simulation, he noted that it had an F-16 simulation in it. In Fortran. The challenge? Port it to Unity3D.

If you have a gamepad, you can try the result. However, the real payoff is the blog posts describing what he did. They go back to 2021, although the most recent was a few months ago, and they cover the entire process in great detail. You can also find the code on GitHub. If you are interested in flight simulation, flying, Fortran, or Unity3D, you’ll want to settle in and read all four posts. That will take some time.

One limitation. The book’s simulator was all about modeling the aerodynamics using data from wind tunnel tests. However, the F-16 is notorious for being a negative stability aircraft — meaning it’s virtually impossible to fly by hand. It is very maneuverable, but only if you let the computer drive using the flight control system. When you direct the aircraft, the control system makes your desire happen, while accounting for all the strange extra motions the plane will create as it flies.

The problem: the book doesn’t include code for the flight controller. [Valgriz], of course, wrote his own. He uses some PID controllers along with limiters for G-force and angle of attack. Interestingly, to do this, the simulator actually runs its own stripped-down simulator to determine the effects of different control inputs.

This is one of those projects we aren’t sure we would attempt, but we’re glad someone did, and we can watch. Just be careful. An interest in flight simulation can lead to reduced space in your garage. We know of at least one F-16, by the way, that has an Arduino in it. However, it is probably the only one.

youtube.com/embed/2HZQnnxdISM?…

youtube.com/embed/7vAHo2B1zLc?…


hackaday.com/2025/10/01/portin…



La trappola del “dato non sensibile”: l’errore che costa caro alle aziende


Un argomento meravigliosamente diffuso nel campo largo di chi svolge attività sui dati personali è quello di sottovalutare i rischi o non volerli guardare affatto è quello secondo cui non occorre farsi particolari problemi nel caso in cui siano trattati dati “non sensibili”. La premessa ontologica per la ricerca di soluzioni e correttivi in ambito di liceità e sicurezza è la capacità di farsi le giuste domande. Motivo per cui la propensione al troppo facile skip non può comporre una strategia funzionale o minimamente utile.

Certo, i dati sensibili esistono nel GDPR e richiamano elevate esigenze di protezione. Questo non comporta però che tutte le altre tipologie di dati (impropriamente chiamati comuni da chi ha proprio bisogno di creare categorie inutili) consentano di prescindere da una corretta gestione dei rischi a riguardo. Non sensibile non può in alcun caso significare “non protetto”, nemmeno attraverso il diaframma dell’interpretazione più spregiudicata che possa essere concepita.

Spregiudicatezza o incoscienza?


Mentre la spregiudicatezza consiste in comportamenti che selezionano opzioni di risparmio in spregio delle regole facendo pagare i costi di sicurezza agli interessati, la fonte dei comportamenti che portano a sottostimare l’importanza di proteggere ogni dato personale è spesso riconducibile ad una vera e propria carenza di consapevolezza. Attenzione: questa ipotesi non apre la porta a scenari meno gravi o in cui può essere configurabile un minore margine di responsabilità.

Violare un dato non sensibile, ovverosia un semplice dato identificativo, può comportare conseguenze impattanti per l’interessato. Basti pensare che la maggior parte del phishing avviene con dati di contatto, con una probabilità di successo maggiore se si dispone di informazioni quali le abitudini di consumo o altre che possono essere espresse o dedotte ma che comunque non hanno una sensibilità rilevante. La possibilità di correlare informazioni ad un interessato, in concreto, lo espone infatti a maggiori rischi di subire furti di identità, frodi o una gamma di spiacevoli conseguenze che purtroppo compongono la quotidianità della vita digitale.

La disponibilità di questi dati per i cybercriminali deriva da attività di OSINT, ma anche dalla possibilità di reperire database violati. Database violati per effetto di azioni svolte impiegando semplici dati di contatto e che si arricchiscono attraverso violazioni ulteriori, aumentando l’efficacia delle successive campagne d’attacco.

Non essere consapevoli di tutto questo è, al giorno d’oggi, ingiustificabile per un’organizzazione che svolge attività su dati personali, a prescindere dalla data maturity.

Ragionare sull’utilizzo sostenibile dei dati personali.


L’aspetto della sicurezza e delle violazioni è dunque un argomento particolarmente convincente per non sottovalutare la protezione di tutti i dati personali, ma c’è un elemento ulteriore: la liceità dei trattamenti. Premesso che la sicurezza dei trattamenti è un obbligo previsto dal GDPR, ci sono infatti anche altre ipotesi di violazione ricorrenti che dovrebbero far ragionare proprio su quanto impattante sia violare le “regole del gioco” sin da principio, come ad esempio:

  • non informare in modo chiaro e completo gli interessati (=violare il principio di trasparenza);
  • aggirare le regole e non garantire i diritti (= violare il principio di correttezza);
  • raccogliere e trattare dati senza seguire una logica (= violare il principio di liceità, limitazione delle finalità e minimizzazione);
  • non cancellare mai i dati non più utili (= violare il principio di limitazione della conservazione).

Ovviamente, tutto questo porta alla creazione di database al di fuori di un controllo consapevole da parte dell’interessato. E costituisce facile opportunità di guadagno per i cybercriminali, dal momento che una mancanza di strategia qual è quella che può emergere dalle violazioni prese come esempio conduce ad un accumulo di dati senza creazione di valore. E in assenza di valore, non c’è percezione di alcun asset da dover proteggere.

La soluzione è quella di ragionare sull’impiego sostenibile del dato personale. La norma precisa e regola le responsabilità, ma un corretto approccio strategico sa ragionare secondo valore generato e non esclusivamente concentrandosi su componenti di costo come la ricerca di scuse o giustificazioni per fare il minimo necessario.

Altrimenti, si cade facilmente in trappole come quella della convinzione di dover proteggere o prestare attenzione ai soli dati sensibili. Con tutti i punti ciechi di gestione che portano all’inevitabile inadeguatezza delle misure predisposte.

Spoiler: gli interessati se ne accorgono. E difficilmente selezioneranno i servizi di chi non sa garantire un impiego sostenibile dei loro dati.

L'articolo La trappola del “dato non sensibile”: l’errore che costa caro alle aziende proviene da il blog della sicurezza informatica.



“Siamo scioccate dal misbruik e colpite dal coraggio delle vittime che hanno deciso di raccontare la loro storia. Condanniamo ogni forma di abuso e offriamo alle vittime le nostre scuse e il nostro cordoglio”.


Con 50 dollari e l’accesso fisico al server, il Cloud si va a far benedire


Un team di ricercatori ha sviluppato un semplice strumento hardware che sfida i principi fondamentali del trusted computing nei moderni ambienti cloud.

Utilizzando un dispositivo dal costo inferiore a 50 dollari, sono stati in grado di aggirare le protezioni hardware di Intel Scalable SGX e AMD SEV-SNP, che abilitano i Trusted Execution Environment (TEE).

Queste tecnologie sono alla base del confidential computing utilizzato dai principali provider cloud e proteggono i dati in memoria da attacchi privilegiati e accessi fisici, inclusi riavvii a freddo e intercettazioni del bus di memoria.

Il dispositivo sviluppato è un interposer DDR4 che viene inserito tra il processore e la memory stick. Manipola le linee di indirizzo e crea alias di memoria dinamici non rilevabili dagli strumenti di sicurezza integrati. A differenza degli attacchi statici basati sulla modifica dei chip SPD, che Intel e AMD hanno già affrontato nel loro nuovo firmware, la natura dinamica dell’interposer gli consente di bypassare i controlli all’avvio e di operare in tempo reale. Questo trasforma costosi attacchi che coinvolgono hardware dal costo di centinaia di migliaia di dollari in un metodo accessibile che richiede investimenti minimi e competenze ingegneristiche di base .

Utilizzando i sistemi Intel Scalable SGX, gli scienziati hanno dimostrato per la prima volta che l’utilizzo di una singola chiave per l’intero intervallo di memoria consente di leggere e scrivere dati arbitrari all’interno di enclave protette. Hanno anche estratto sperimentalmente la chiave di sicurezza della piattaforma alla base del meccanismo di attestazione remota. Ciò compromette completamente la credibilità del sistema: un aggressore può generare attestazioni false senza accedere all’hardware effettivo. Ciò compromette il meccanismo di verifica dell’integrità fondamentale nei servizi cloud.

Nel caso di AMD SEV-SNP, i ricercatori hanno dimostrato un bypass dei nuovi meccanismi ALIAS_CHECK progettati per proteggere dagli attacchi di tipo BadRAM. Il loro metodo ha permesso loro di riprodurre scenari precedentemente considerati sicuri, tra cui la sostituzione di blocchi di testo cifrato e la riproduzione. L’attacco consente di creare macchine virtuali fittizie che superano la verifica remota come legittime, distruggendo di fatto il sistema di fiducia nell’ecosistema SEV .

Il dispositivo è realizzato utilizzando componenti facilmente reperibili: un circuito stampato, un microcontrollore Raspberry Pi Pico 2 e una coppia di interruttori analogici. L’intero progetto è costato meno di 50 dollari, il che lo rende di gran lunga più economico degli analizzatori DDR4 professionali. Inoltre, gli attacchi sono deterministici e rapidi, senza la necessità di apparecchiature costose o condizioni complesse.

Lo studio ha dimostrato che anche le piattaforme aggiornate con firmware Intel e AMD sono vulnerabili a semplici attacchi fisici se un avversario ha accesso temporaneo al server. Potrebbe trattarsi di un dipendente di un provider cloud , di un agente della supply chain o persino delle forze dell’ordine con accesso alle apparecchiature. Gli autori sottolineano che tali minacce non possono essere ignorate, poiché la crittografia della memoria basata su hardware è stata introdotta proprio per prevenirle.

I ricercatori hanno divulgato i dettagli a Intel nel gennaio 2025 e ad AMD a febbraio. Entrambe le aziende hanno riconosciuto la vulnerabilità, ma hanno dichiarato che gli attacchi fisici andavano oltre i loro modelli di minaccia. Arm, dopo aver ricevuto notifica della potenziale applicabilità del metodo all’architettura CCA, ha anche affermato che l’accesso fisico non era coperto dalle garanzie delle sue soluzioni. Dopo la fine dell’embargo, il progetto, inclusi il codice sorgente e il firmware per l’interposer, è stato pubblicato pubblicamente su GitHub.

Gli autori sottolineano che la transizione verso TEE scalabili è stata accompagnata da un indebolimento delle garanzie crittografiche a vantaggio delle prestazioni e del supporto completo della memoria. Questa soluzione, precedentemente considerata sicura, si è rivelata vulnerabile ad attacchi hardware a basso costo. La sicurezza futura può essere rafforzata solo tornando a metodi crittografici più potenti o passando alla memoria integrata, dove l’accesso fisico al bus è impossibile.

L'articolo Con 50 dollari e l’accesso fisico al server, il Cloud si va a far benedire proviene da il blog della sicurezza informatica.



Parma, sequestrate 21 opere della mostra su Dalì: “Sono false”

[quote]PARMA – Sono state sequestrate 21 opere false attribuite a Salvador Dalì in una mostra al Palazzo Tarasconi di Parma. Tra gli oggetti sequestrati ci sono arazzi, disegni, incisioni e…
L'articolo Parma, sequestrate 21 opere della lumsanews.it/parma-sequestrate…



Flotilla in rotta su Gaza. Sfiorata collisione con nave israeliana. L’appello di Italia e Grecia

[quote]Nella notte alcune imbarcazioni sono state avvicinate da navi non identificate che hanno fatto operazioni di disturbo
L'articolo Flotilla in rotta su Gaza. Sfiorata collisione con nave israeliana. L’appello di Italia e Grecia su



A ‘stray bullet’ 25,000 people offline near Dallas.#News


A Bullet Crashed the Internet in Texas


The internet can be more physically vulnerable than you think. Last week, thousands of people in North and Central Texas were suddenly knocked offline. The cause? A bullet. The outage hit cities all across the state, including Dallas, Irving, Plano, Arlington, Austin, and San Antonio. The outage affected Spectrum customers and took down their phone lines and TV services as well as the internet.

“Right in the middle of my meetings 😒,” one users said on the r/Spectrum subreddit. Around 25,000 customers were without services for several hours as the company rushed to repair the lines. As the service came back,, WFAA reported that the cause of the outage came from the barrel of a gun. A stray bullet had hit a line of fiber optic cable and knocked tens of thousands of people offline.
playlist.megaphone.fm?p=TBIEA2…
“The outage stemmed from a fiber optic cable that was damaged by a stray bullet,” Spectrum told 404 Media. “Our teams worked quickly to make the necessary repairs and get customers back online. We apologize for the inconvenience.”

Spectrum told 404 Media that it didn’t have any further details to share about the incident so we have no idea how the company learned a bullet hit its equipment, where the bullet was found, and if the police are involved. Texas is a massive state with overlapping police jurisdictions and a lot of guns. Finding a specific shooting incident related to telecom equipment in the vast suburban sprawl around Dallas is probably impossible.

Fiber optic cable lines are often buried underground, protected from the vagaries of southern gunfire. But that’s not always the case, fiber can be strung along telephone poles in the sky and sent to a vast and complicated network junction boxes and service stations that overlap different municipalities and cities, each with their own laws about how the cable can be installed. That can leave pieces of the physical infrastructure of the internet exposed to gunfire and other mischief.

This is not the first time gunfire has taken down the internet. In 2022, Xfinity fiber cable in Oakland, California went offline after people allegedly fired 17 rounds into the air near one of the company’s fiber lines. Around 30,000 people were offline during that outage and it happened moments before the start of an NFL game that saw the Los Angeles Rams square off against the San Francisco 49ers.

“We could not be more apologetic and sincerely upset that this is happening on a day like today,” Comcast spokesperson Joan Hammel told Dater Center Dynamics at the time. Hammel added that the company has seen gunshot wounds on its equipment before. “While this isn’t completely uncommon, it is pretty rare, but we know it when we see it.”


#News

Breaking News Channel reshared this.



Quale sarà il futuro di Daniel Ek dopo Spotify?

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Nel 2026 Daniel Ek lascerà la carica di amministratore delegato di Spotify, azienda che in quasi vent'anni ha rivoluzionato l'industria della musica (e non solo). Il co-fondatore ha spiegato di volersi concentrare sullo sviluppo di nuove startup innovative



Student journalists fight Trump’s anti-speech deportations


It’s not every day a student newspaper takes on the federal government. But that’s exactly what The Stanford Daily is doing.

Backed by the Foundation for Individual Rights and Expression, the Daily sued Secretary of State Marco Rubio and Secretary of Homeland Security Kristi Noem in August over the Trump administration’s push to deport foreign students for exercising free speech, like writing op-eds and attending protests. The suit argues the administration’s actions violate the First Amendment by retaliating against foreign students for protected speech and chill press freedom by discouraging them from speaking to and writing for the Daily.

We spoke at the start of Stanford University’s fall term with Greta Reich, editor-in-chief of the Daily and president of Stanford Daily Publishing Corp., which operates the paper, about why the Daily is fighting back, even as many corporate media outlets stay silent or capitulate.

Why did The Stanford Daily decide to take this issue to court?

We decided to take this issue to court because we believe legal action would be best for the Daily. Our mission as an independent student paper is to represent the voices of the Stanford community. We cannot fulfill this mission to the fullest extent when a significant portion of students on our campus and in our newsroom are afraid to speak up. The decision ultimately came down to whether or not we felt we could handle the potential negative ramifications of a public suit against the government in order to stay true to our mission. We decided that we could, and we’re hoping for the best outcome.

What happens to your reporting when international students are afraid to talk to your reporters, or when staff quit or avoid covering certain stories because they’re worried about government retaliation?

As we said in our letter from the editors on the lawsuit, fear of government retaliation directly impacts the quality of the Daily’s work.

With every resignation, declined assignment, and refusal to speak on the record, we actively miss out on covering an entire group of students’ voices — as well as the many events and stories on campus that benefit from an international student’s perspective. We are simply not able to conduct our business when speech is chilled like this.

Journalism, and especially student journalism, depends on members of a community not only being able to speak on the record but actively wanting to, at least at times. When an entire subsection of the student population doesn’t feel comfortable speaking with or writing for the Daily, we can’t know what stories are being lost.

When an entire subsection of the student population doesn’t feel comfortable speaking with or writing for the Daily, we can’t know what stories are being lost.


Greta Reich, editor-in-chief of The Stanford Daily

How have people on campus responded to the lawsuit so far?

We only returned to campus this week, so I don’t think I’ve seen every reaction yet, but so far the biggest response has been curiosity. Many of my peers, both in and outside of the Daily, have questions about how the lawsuit is going.

In speaking more in depth with some students throughout the summer and hearing feedback on various social platforms, I know there is a somewhat mixed reaction, though I think it skews positive. Some students, understandably, are concerned about the attention the suit will draw to Stanford as a university. Others have expressed excitement about action being taken to protect First Amendment rights.

I hope that as the suit progresses, students, alumni, faculty, and community members will feel comfortable sharing any opinion with us — we want to hear what people have to say!

How does it feel to stand up for the First Amendment as student journalists when some in corporate media are utterly failing to do so?

It feels great! As student journalists, we definitely face a different set of obstacles and constraints than those in corporate media do. I think that, in a way, these different constraints give us the freedom to take actions like these (though it would be exciting to see more publications taking action too). I am incredibly grateful for all of the support I’ve received from professional journalists and mentors in corporate media, who have reached out with kind words for the Daily. It is not taken for granted one bit.

What outcome are you hoping for, both in terms of the law, but also inspiring student journalists or impacting the national conversation about press freedom?

In terms of the law, we are obviously hoping for the lawsuit to create a real change in how noncitizens are treated with respect to the First Amendment. Whether working for or speaking to our newspaper, no one should fear deportation for what they have to say. In any scenario, I hope those who hear about this lawsuit consider what it means to have a free press and why fear tactics like those the government is currently using have such an impact on it. A central tenet of my education at Stanford has been to form and express my thoughts and opinions with agility. The ability to state these thoughts and opinions publicly is not only being threatened but actively taken away.

And to other student journalists: I am constantly inspired by you and your work, and I hope you are getting through this year with support and engagement from your staff and readers.


freedom.press/issues/student-j…




Al via dal 4 ottobre il XXII Congresso dell’Associazione Luca Coscioni


Appuntamento sabato 4 ottobre alle 9.30 al Palazzo del Capitano del Popolo, in piazza del Popolo 1 ad Orvieto. Il Congresso si svolgerà anche nella giornata di domenica 5 ottobre

Il titolo si ispira a una frase di Laura Santi: “Non rassegnatevi mai”


Oltre 170mila persone hanno sostenuto le nostre richieste alla politica per rimuovere le discriminazioni su fine vita, PMA, aborto e psichedelici. Sono 39 le azioni legali intraprese, 241 le richieste di accesso agli atti. Il Congresso sarà anche l’occasione per fare il punto sui nuovi obiettivi e le azioni politiche del 2026. Filomena Gallo e Marco Cappato commentano: “Non stiamo ad aspettare che vengano tempi migliori per i diritti civili, altrimenti si rischia di tornare indietro come negli USA“.


Nonostante l’ostilità o l’inerzia dei vertici della politica ufficiale e dei partiti, il 2025 è stato un anno di conquiste e azioni concrete per la libertà di scelta, l’autodeterminazione e il diritto alla salute. Dall’approvazione di due leggi regionali per tempi certi di erogazione delle prestazioni sul “suicidio assistito” in Toscana e Sardegna, con proposte analoghe depositate in tutte le Regioni fino alla proposta di legge nazionale in Parlamento per legalizzare l’eutanasia.

E poi, quattro sentenze della Corte costituzionale ottenute tramite procedimenti giudiziari accanto alle persone: due sul fine vita (sentenze 66/2025 e 132/2025) che interpretano come deve essere considerato il requisito del trattamento di sostegno vitale, una sull’accesso alla procreazione medicalmente assistita per donne singole che evidenzia che la cancellazione del divieto non incontra ostacoli costituzionali; una sentenza che ammette con sentenza di incostituzionalità, la firma certificata per le persone che non possono firmare manualmente le liste elettorali, attuando piena partecipazione politica alla vita del paese senza discriminazioni.

La richiesta di garantire l’aborto farmacologico senza obbligo di ricovero e la possibilità alle persone con disabilità di viaggiare in aereo con la propria carrozzina; la pressione sulle ASL per il diritto alla salute in carcere; liste di attesa azioni per garanzie nell’ accesso alle prestazioni. L’Associazione Luca Coscioni ha trasformato nell’ultimo anno le battaglie civili in conquiste di libertà.

Il XXII Congresso, in programma il 4 e 5 ottobre 2025 a Orvieto porrà le basi per le azioni future nella nella Regione dove sono nati Luca Coscioni, pioniere della libertà di ricerca scientifica, e Laura Santi, leader e volto della campagna sul fine vita, che dopo un calvario giudiziario di tre anni ha ottenuto il diritto ad accedere al “suicidio assistito” nel suo Paese, sostenuta dall’Associazione. “Non rassegnatevi mai”, le sue ultime parole, insieme alla memoria di Luca, saranno il filo conduttore del Congresso e delle strategie future dell’Associazione.

Filomena Gallo e Marco Cappato, rispettivamente Segretaria nazionale dell’Associazione e Tesoriere dell’Associazione, hanno dichiarato: “La nostra missione è quella di dare voce e volto alle persone rese invisibili dalla ottusità e dalla violenza delle istituzioni ancora di più che dalla malattia o dalla disabilità e di consentire loro di battersi in prima persona. Non aspettiamo che ‘vengano tempi migliori’ per le libertà civili, perché rischierebbero di non arrivare mai. Infatti, in assenza di lotte sociali nonviolente, in grado di imporsi nell’agenda della politica ufficiale, si rischia anche nel nostro Paese, come sta avvenendo negli USA e in altri Paesi formalmente democratici, un arretramento sul piano dei diritti civili“.

➡ Oltre 170mila firme raccolte


Nell’ultimo anno l’Associazione Luca Coscioni ha raccolto le firme di oltre 170 mila persone in tutta Italia sui temi principali delle sue ventennali battaglie: eutanasia e fine vita, procreazione medicalmente assistita, gravidanza per altri, Aborto senza ricovero, per garantire la possibilità di deospedalizzare l’aborto farmacologico, disabilità, terapie assistite da psichedelici, cannabis legale e firma digitale.

A queste si aggiungono le firme 65.000, raccolte in questi anni su Liberi Subito, la proposta di legge regionale che garantisce il percorso di richiesta di suicidio medicalmente assistito e i controlli necessari in tempi certi e adeguati.

➡ Sono state intraprese 39 azioni legali


Fine vita: 24 procedimenti di cui 18 civili e 6 penali, riguardo l’accesso al “suicidio assistito” in Italia e le disobbedienze civili per l’accompagnamento in Svizzera. Di questi 10 sono attualmente in tribunale e gli altri in fase stragiudiziale. Mentre per i procedimenti penali: un procedimento con tre persone sulle quali pende una imputazione coatta (Felicetta Maltese, Chiara Lalli e Marco Cappato) e altre nove indagate nei cinque procedimenti in cui sono in corso le indagini.

PMA: 15 casi sul tema della fecondazione assistita nei tribunali, di cui oltre 10 sul tema della gravidanza per altri (GPA). Di questi 10, almeno 7 anche sul fronte penale. Sono oltre 50 i casi su cui sono stati forniti pareri in fase stragiudiziale. Sul tema della PMA, è stata ottenuta una sentenza della Corte costituzionale in merito all’accesso alla PMA per donne singole a partire del caso di Evita, 40enne torinese, cui è stata negato l’accesso in Italia alla PMA.

➡ Sono stati condotti 241 accessi agli atti


Salute in carcere: a seguito delle diffide per verificare le condizioni igienico-sanitarie negli istituti penitenziari, sono state effettuate 102 richieste di accesso agli atti a tutte le ASL italiane per ottenere le relazioni delle visite in carcere in modo da monitorare le condizioni degli istituti.

Fine vita (“suicidio assistito”): sono state effettuate 93 richieste di accesso agli atti tra Regioni e ASL per conoscere il numero di richieste di accesso al “suicidio assistito” effettuate in Italia dalla sentenza della Corte costituzionale 242 del 2019 sul caso Cappato-Dj Fabo che ha di fatto legalizzato l’accesso alla morte volontaria assisita in Italia a determinate condizioni.

Sempre in tema di fine vita, oltre 16.000 cittadini hanno ricevuto informazioni tramite il Numero Bianco su diritti legati a fine vita. Le iniziative popolari hanno portato all’approvazione di 2 leggi regionali sul suicidio assistito, al deposito in tutte le Regioni (discussa in 6), mentre sono state ottenute 2 udienze in Corte costituzionale sul fine vita. A livello nazionale, è stata depositata una proposta di legge di iniziativa popolare per legalizzare l’eutanasia. Sono 16.000, inoltre, i testamenti biologici scaricati dal sito dell’Associazione.

Barriere architettoniche: L’Associazione sta conducendo anche una attività di ricognizione dei Piani di Eliminazione delle barriere architettoniche nei comuni capoluoghi italiani. A fronte delle informazioni reperite sui siti di 60 capoluoghi, sono state promosse 46 richieste di accessi agli atti nelle restanti città. All’accesso, per il momento, hanno risposto 17 capoluoghi.

➡ Partecipazione e mobilitazione


Oltre 585 eventi pubblici in tutta Italia hanno portato nelle piazze e nelle città temi sociali e scientifici spesso ignorati dalla politica, coinvolgendo 45.000 persone in campagne, petizioni e azioni politiche. Sono state inoltre depositate 2 proposte di legge in Parlamento, una sul fine vita e una sulla legalizzazione della gravidanza per altri.

L'articolo Al via dal 4 ottobre il XXII Congresso dell’Associazione Luca Coscioni proviene da Associazione Luca Coscioni.



La presidenza Trump non è follia, è la conseguenza della politica dello spettacolo


Quando Neil Postman pubblicò Amusing Ourselves to Death (Compiaciamoci fino alla morte) nel 1985, la sua tesi era tanto semplice quanto radicale: non è il contenuto a determinare la qualità del dibattito pubblico, ma il mezzo che lo veicola. Il modo in cui comunichiamo, scriveva, cambia ciò che siamo in grado di pensare e discutere. All’epoca con la televisione come “nuovo mezzo”a trasformare la politica in spettacolo fino ad oggi, con Donald Trump e i social media, quel processo sembra più che compiuto: la politica è intrattenimento puro.

Trump, di cui continuiamo a stupirci e a chiederci “perché”, ne è forse il più banale esempio, paradossalmente.

Dal giornale al tweet: il mezzo è il messaggio


Per capire perché questo modello ha avuto tanto successo, Postman ci invita a guardare indietro. Fino all’Ottocento, negli Stati Uniti il principale mezzo di comunicazione era la parola scritta: libri, giornali, opuscoli. La popolazione era in larga parte alfabetizzata (quasi 98% della popolazione) e aveva l’abitudine di leggere e collegare le informazioni. Non era raro assistere a dibattiti pubblici , come quelli celebri tra Lincoln e Douglas , che duravano piu di quattro ore, con lunghi monologhi e ragionamenti articolati. Non si trattava di intrattenere, ma di argomentare: chi ascoltava era in grado di seguire, analizzare, confutare e il politico non doveva ottenere il tifo da stadio, ma il vero assenso critico.

Con il telegrafo prima e la televisione poi, il tempo di attenzione si è contratto. In una società capitalista, ciò che si vende non è mai neutro: lo spettacolo diventa il fine, il contenuto un pretesto. La notizia non arrivava più come parte di una catena di cause ed effetti, ma come frammento isolato, un “flash” che si consumava in sé. Persino il ritmo dei telegiornali, quel “and now…” che introduce il servizio successivo, contribuisce a dare l’idea che ogni notizia sia un pacchetto isolato, slegato dal contesto, incapace di creare una continuità storica. Il cervello registra, archivia e passa oltre: informati, ma senza davvero comprendere. L’educazione stessa, nei programmi per bambini, si piegava a questa logica: più che formare menti critiche, occorreva mantenere alta l’attenzione, catturare con colori, suoni, immagini veloci.

Da qui alla politica lo scarto è breve. Se il cittadino è trattato come consumatore, e il dibattito politico come un prodotto televisivo, allora ciò che conta non è la coerenza di un programma ma la capacità di intrattenere. È in questo contesto che Trump, come introdotto, non appare come un’anomalia, bensì come il compimento logico di un lungo percorso. Le sue frasi contraddittorie, gli insulti in diretta, le provocazioni da circo non sono “scivoloni” o comportamenti da “outsider” ma parte integrante di un format: quello della politica come show. Trump quindi è il massimo splendore, o il punto più estremo, della politica-spettacolo repubblicana, costruita per scatenare emozioni e fidelizzare il pubblico-elettorato come fosse una tifoseria.

Trump non ha inventato nulla, ma ha colto meglio di chiunque altro lo spirito di questo ecosistema. Ha trasformato la campagna elettorale in reality show, la conferenza stampa in wrestling verbale, il tweet in un orrendo capslock come documento ufficiale di Stato, cosa impensabile in un paese europeo. Per i suoi sostenitori, non importa se le sue affermazioni resistano a un fact-check: importa la loro forza emotiva, la capacità di far arrabbiare l’avversario o di rafforzare l’identità della propria “squadra”.

In questo senso, Postman aveva visto giusto: quando la politica si piega alle regole dell’intrattenimento, il pensiero critico diventa un lusso, la democrazia si riduce a spettacolo.

E in Europa?


A guardarla dall’Europa, questa deriva sembra grottesca, un eccesso tutto americano. Eppure anche noi stiamo importando lo stesso modello, con qualche anno di ritardo. Dai talk show alla comunicazione social dei leader politici, il meccanismo è identico: polarizzazione, frasi a effetto, immagini virali che scatenano emozioni immediate e poco più. Le differenze sono “solo” due: negli Stati Uniti questa logica agisce da decenni, in Italia e in Europa da molto meno. Inoltre, In Italia ed Europa il peso della scuola, della tradizione letteraria e di una cultura politica più stratificata hanno lasciato ancora tracce di profondità. Nonostante l’analfabetismo funzionale crescente, l’educazione alla lettura e all’argomentazione ha conservato uno spazio. Non a caso, almeno da parte maggioritaria della sinistra, il dibattito resta più strutturato, più legato al contenuto che alla performance.

C’è però un elemento nuovo rispetto all’epoca di Postman: i social network. Essi rappresentano allo stesso tempo il problema e la possibile soluzione. Da un lato amplificano la logica dell’infotainment: un tweet o un reel valgono più di un ragionamento complesso, e il meccanismo della viralità favorisce contenuti che generano emozione più che conoscenza. Dall’altro lato, i social possono essere usati anche per il debunking, per spezzare il ciclo dell’emotività e offrire strumenti critici. Sta qui la sfida: trasformare lo stesso mezzo che alimenta la superficialità in un veicolo di consapevolezza.
Un esempio recente di come la politica-spettacolo emotiva repubblicana (“trumpiana”) statunitense si sia infiltrata e adattata perfettamente alla comunicazione politica, di destra in Italia nel particolare, arriva dalla narrazione sulla morte di Charlie Kirk sfruttata come miccia emotiva per generare indignazione e mobilitare il pubblico, indipendentemente dalla verità dei fatti. In questo caso, l’onda mediatica costruita attorno alla vicenda ha fatto leva sulle emozioni immediate degli spettatori, trasformando un evento complesso in un pretesto per uno storytelling politico spettacolare. Paradossalmente, lo stesso mezzo, i social, usati dalla stessa vittima per portare messaggi estremi, divisivi e di “intrattenimento”, potrebbe essere usato anche per il debunking rapido e per restituire al pubblico un quadro più chiaro, insegnando a leggere le notizie con senso critico e a non fermarsi alla reazione emotiva iniziale.

Politica o intrattenimento? Una scelta cruciale


Se lasciamo che l’emotività prevalga sulla razionalità, se non creiamo spazi di confronto e approfondimento, finiremo per importare in blocco il modello americano, con le sue contraddizioni e i suoi rischi.

Il futuro non è scritto, diceva Postman. Ed è vero anche oggi: dipende da come useremo i mezzi di comunicazione, se come strumenti di intrattenimento o come occasioni di pensiero. La differenza non è secondaria. Da essa dipende la qualità della nostra democrazia.

Karin Silvi
Possibile Reggio Emilia

L'articolo La presidenza Trump non è follia, è la conseguenza della politica dello spettacolo proviene da Possibile.





A proposito di treni bloccati…

@Politica interna, europea e internazionale

In Germania, un’italiana di Bolzano prende in mano le rotaie delle ferrovie pubbliche. Evelyn Palla, manager cresciuta all’estero ma di chiare origini italiane, è stata nominata alla guida della Deutsche Bahn. Sarà la prima donna a dirigere il colosso tedesco, con un compito ben chiaro: rimettere sui binari un sistema ferroviario che da orgoglio



2025, una lunga estate (troppo) calda


@Notizie dall'Italia e dal mondo
Nel corso del 2025, l’Europa ha di nuovo vissuto un’estate segnata da incendi devastanti e temperature record, con effetti che si intrecciano a disuguaglianze sociali e fragilità economiche. Dalle ondate di calore alla cooling poverty, il cambiamento climatico ha mostrato ancora una volta il suo
L'articolo 2025, una lunga estate (troppo) calda

Mauro in montagna reshared this.



Accidenti, il genocidio è già finito

@Politica interna, europea e internazionale

E ora, come la mettiamo con l’ipotesi genocidaria? Ora che Benjamin Netanyahu ha accettato un piano di pace che non prevede la deportazione dei palestinesi da Gaza, ma, al contrario, la nascita di un governo guidato da “palestinesi”, come potranno i teorici dell’orrida similitudine tra lo Stato di Israele e il Terzo Reich andare



Missili Houthi su nave cargo europea. Perché l’attacco riguarda tutti noi

@Notizie dall'Italia e dal mondo

Il Golfo di Aden, già da tempo teatro di tensioni, è tornato al centro delle cronache a seguito dell’attacco al cargo olandese Minervagracht. Colpita da missili Houthi e ridotta in fiamme, la nave è stata evacuata grazie all’intervento delle fregate europee della missione



MAROCCO. La Generazione Z scende in piazza


@Notizie dall'Italia e dal mondo
I giovani marocchini crescono in un mondo digitale ricco di immagini da ogni parte del mondo che mostrano diritti garantiti e standard di qualità. E li vogliono anche in Marocco
L'articolo MAROCCO. La Generazione Z scende in piazza proviene dahttps://pagineesteri.it/2025/10/01/africa/marocco-la-generazione-z-scende-in-piazza/






Il rock della prigione
freezonemagazine.com/rubriche/…
“La guardia organizzò una festa nella prigione della contea, la band era lì e cominciò a darci dentro, la band stava saltando e tutti i carcerati cominciarono ad agitarsi, avreste dovuto sentire come cantavano quei perdenti uccellini in gabbia. Scateniamoci tutti quanti, scateniamoci tutti quanti nell’intero settore delle celle. Ballavano il Rock della Prigione“. In […]
L'articolo Il rock della pr
“La


Qualcuno/a di voi avrà letto che dopo le sanzioni americane contro Francesca Albanese lei aveva provato ad aprire un conto presso Banca Etica e che la banca non aveva potuto aprirglielo.

La spiegazione, in breve:

le banche che offrono servizi a individui o entità presenti nelle liste Ofac sono passibili di sanzioni civili (multe di milioni di dollari, confisca di fondi e asset delle persone sanzionate, etc.) e penali, restrizioni operative su tutta l’operatività in dollari di tutti i clienti, controlli più rigidi e audit da parte delle autorità, implementazione di programmi di compliance più severi che ne possono bloccare interamente l’operatività anche per lunghi periodi di tempo.


Per chi volesse approfondire invece:
altreconomia.it/perche-banca-e…

reshared this



rainews.it/articoli/2025/09/uc…

“Salvatore - dice ancora il prete - è una persona fragile, tranquilla. Un lavoratore, anche se in passato aveva sofferto di una depressione da cui era guarito”.

Poverino... mi fa una pena...

E invece della moglie e del figlio minorenne, uccisi a sassate, e della figlia in prognosi riservata con una frattura cranica, sempre per i colpi con un sasso, non abbiamo nulla da dire?

Loro non erano "grandi lavoratori"? Non erano persone tranquille? La loro salute com'era?

Loro non salutavano sempre?

E questa è la Rai, gente che dovrebbe avere un'infarinatura di come è opportuno raccontare i femminicidi, e invece... una professionalità da giornalino studentesco.



:: ACUFENI :: FASTIDI AURICOLARI CONTEMPORANEI #32


Nuove recensioni su :: acufeni ::
Questa settimana ci siamo persi (e ritrovati) tra post punk, elettronica, black metal e patchwork sonori fuori da ogni schema.

- Coded Marking – debutto impeccabile, forse fin troppo. Un album che avrebbe potuto gridare, ma sceglie di sussurrare.
- Giant Claw – libertà totale e ironia sonora: un patchwork che funziona come poche volte capita.
- Sea Mosquito – spiritualità oscura e critica alla modernità: psichedelia e black metal intrecciati in un lavoro imponente, anche se non perfetto.
- Siavash Amini – Caligo: la polvere dei bombardamenti a Teheran trasformata in un suono che fa male.
- Xeeland – Master Builder: drone e krautrock per costruire cattedrali di cemento sonoro, fredde e opprimenti.

#iyezine #inyoureyesezine #iyezine.com
iyezine.com/acufeni-fastidi-au…
@Musica Agorà



I sondaggi anonimi su Mastodon sono davvero anonimi? Beh, parliamone...

Riportiamo una sintesi di un post pubblicato un anno fa da @Terence Eden sulla questione dell'anonimato nei sondaggi di Mastodon, ma il post richiama l'attenzione sul fatto che tutto ciò che rende aperto il Fediverso rende necessaria una maggiore consapevolezza da parte degli utenti.

Quando voti in un sondaggio, il tuo server invia un messaggio al server dell'utente che ha creato quel sondaggio dicendo: "Sono l'utente @XXXX@YYY.ZZ e desidero votare per l'opzione X. Ecco una firma HTTP che conferma il mio messaggio."

Le specifiche Activitystreams relative ai sondaggi non sono definite benissimo e anche la documentazione di Mastodon è un po' vaga. Nessuno dei due affronta con chiarezza la questione della privacy.

C'è un eccellente post sul blog di @Humberto Rocha (Aprovecho la oportunidad... Hola Humberto, ¿podrías arreglar el enlace a tu cuenta de Mastodon en tu blog?) che analizza il sondaggio Mastodon in ActivityPub. Mostra chiaramente che un voto è solo un normale messaggio che viene trasmesso al server ricevente.

Servizi come Mastodon sono appositamente sviluppati per non permettere all'autore del sondaggio di vedere chi ha votato e per quale opzione.

Ma questa è solo una convenzione. Non c'è nulla di tecnico che impedisca di recuperare quel dato. Se quel dato esiste, allora c'è un modo per intercettarlo. Un server mastodon inaffiddabile o appositamente configurato per raccogliere dati può collegare le tue preferenze al tuo account

Pertanto, quando vedi un sondaggio su Mastodon, poniti sempre queste domande:

1) dichiarare una preferenza in quel sondaggio può danneggiarmi?
2) il server cui appartiene l'utente che lancia il sondaggio rispetta il GDPR oppure è un server extracomunitario? O, peggio, è un server comunitario senza privacy policy o con una privacy policy ricopiata da un altro server?

All'esposizione di un qualsiasi dato personale, infatti, corrisponde sempre una riduzione delle proprie difese.

Da chi potrebbe essere sfruttata questa caratteristica?

1) un attore che lo fa attraverso un server malevolo, appositamente configurato per raccogliere quetsi dati
2) un attore che lo fa attraverso un server che ha compromesso

Perché qualcuno dovrebbe sfruttare questa caratteristica?

1) per profilare il tuo account anonimo/pseudonimo e renderne più facile l'identificazione
2) per profilare te e il tuo account già correlato alla tua vera identità e colpirti dal punto di vista reputazionale (al tuo datore di lavoro piace avere dipendenti sotto l'attacco di una shitstorm?) o legale (pensa solo a come il governo degli USA sta rendendo illegali opinioni e comportamenti)

Se sei interessato a questi contenuti sul #Fediverso puoi seguire l'utente @Che succede nel Fediverso?; si tratta di un "gruppo activitypub" che simula i gruppi Facebook: quando lo segui, l'account ti ricondivide tutti i messaggi di chi lo menziona! Se vuoi scrivere un post sul Fediverso, ricordati di menzionare quell'utente alla fine del tuo nuovo messaggio

shkspr.mobi/blog/2024/09/no-ac…

reshared this

in reply to Poliverso - notizie dal Fediverso ⁂

La prima volta che ho fatto un sondaggio mi sono chiesto perché alla fine non mi dicesse chi aveva votato cosa, l'ho sempre trovato strano, mi è sempre stato evidente che "il sistema" avesse l'informazione e mi è sempre sembrato un difetto che questa informazione non fosse accessibile.

Concordo, se si vogliono sondaggi anonimi, l'anonimato va gestito a livello di protocollo. Non chiamerei neppure "malevolo" un server che mostri le informazioni che ha…
@humrochagf @Edent @fediverso

in reply to Pare 🚲 🌞

Comunque il programma che uso per il fediverso, quando scrivo messaggi diretti (privati? personali?) apre un riquadro per ricordarmi che non c'è alcuna vera garanzia di protezione.
Forse sarebbe bene mettere un messaggio del genere anche ogni volta che viene proposto di rispondere a un sondaggio?

Sui media della "concorrenza" non viene ricordato ad ogni piè sospinto che "il sistema registra molte più cose di quanto pensiate", ma qui val la pena farlo, no?
@humrochagf @Edent @fediverso

Questa voce è stata modificata (22 ore fa)
in reply to Pare 🚲 🌞

@Pare 🚲 🌞 @Humberto Rocha @Terence Eden

Forse sarebbe bene mettere un messaggio del genere anche ogni volta che viene proposto di rispondere a un sondaggio?

Sono d'accordo

Fediverso reshared this.

in reply to Pare 🚲 🌞

@Pare 🚲 🌞 il sondaggio deve restare "segreto", soprattutto per evitare effetti distorsivi sui partecipanti ed è giusto che resti "anonimo" perché fa parte del gioco. Ma il punto è che si tratta di un gioco, non di una votazione ufficiale 😅

@Humberto Rocha @Terence Eden

Fediverso reshared this.




Documents show that ICE has gone back on its decision to not use location data remotely harvested from peoples' phones. The database is updated every day with billions of pieces of location data.

Documents show that ICE has gone back on its decision to not use location data remotely harvested from peoplesx27; phones. The database is updated every day with billions of pieces of location data.#News


ICE to Buy Tool that Tracks Locations of Hundreds of Millions of Phones Every Day


Immigration and Customs Enforcement (ICE) has bought access to a surveillance tool that is updated every day with billions of pieces of location data from hundreds of millions of mobile phones, according to ICE documents reviewed by 404 Media.

The documents explicitly show that ICE is choosing this product over others offered by the contractor’s competitors because it gives ICE essentially an “all-in-one” tool for searching both masses of location data and information taken from social media. The documents also show that ICE is planning to once again use location data remotely harvested from peoples’ smartphones after previously saying it had stopped the practice.

Surveillance contractors around the world create massive datasets of phones’, and by extension people’s movements, and then sell access to the data to government agencies. In turn, U.S. agencies have used these tools without a warrant or court order.

“The Biden Administration shut down DHS’s location data purchases after an inspector general found that DHS had broken the law. Every American should be concerned that Trump's hand-picked security force is once again buying and using location data without a warrant,” Senator Ron Wyden told 404 Media in a statement.

💡
Do you know anything else about this contract or others? Do you work at Penlink or ICE? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

The ICE document is redacted but says a product made by a contractor called Penlink “leverages a proprietary data platform to compile, process, and validate billions of daily location signals from hundreds of millions of mobile devices, providing both forensic and predictive analytics.” The products the document is discussing are Tangles and Webloc.

Forbes previously reported that ICE spent more than $5 million on these products, including $2 million for Tangles specifically. Tangles and Webloc used to be run by an Israeli company called Cobwebs. Cobwebs joined Penlink in July 2023.

The new documents provide much more detail about the sort of location data ICE will now have access to, and why ICE chose to buy access to this vast dataset from Penlink specifically.

“Without an all-in-one tool that provides comprehensive web investigations capabilities and automated analysis of location-based data within specified geographic areas, intelligence teams face significant operational challenges,” the document reads. The agency said that the issue with other companies was that they required analysts to “manually collect and correlate data from fragmented sources,” which increased the chance of missing “connections between online behaviors and physical movements.”
A screenshot from the document.
ICE’s Homeland Security Investigations (HSI) conducted market research in May and June, according to the document. The document lists two other companies, Babel Street and Venntel, which also sell location data but which the agency decided not to partner with.

404 Media and a group of other media outlets previously obtained detailed demonstration videos of Babel Street in action. They showed it was possible for users to track phones visiting and leaving abortion clinics, places of worship, and other sensitive locations. Venntel, meanwhile, was for some years a popular choice among U.S. government agencies looking to monitor the location of mobile phones. Its clients have included ICE, CBP, and the FBI. Its contracts with U.S. law enforcement have dried up in more recent years, with ICE closing out its work with the company in August, according to procurement records reviewed by 404 Media.

Companies that obtain mobile phone location data generally do it in two different ways. The first is through software development kits (SDKs) embedded in ordinary smartphone apps, like games or weather forecasters. These SDKs continuously gather a user’s granular location, transfer that to the data broker, and then sell that data onward or repackage it and sell access to government agencies.

The second is through real-time bidding (RTB). When an advert is about to be served to a mobile phone user, there is a near instantaneous, and invisible, bidding process in which different companies vie to have their advert placed in front of certain demographics. A side-effect is that this demographic data, including mobile phones’ location, can be harvested by surveillance firms. Sometimes spy companies buy ad tech companies out right to insert themselves into this data supply chain. We previously found at least thousands of apps were hijacked to provide location data in this way.

Penlink did not respond to a request for comment on how it gathers or sources its location data.
playlist.megaphone.fm?p=TBIEA2…
Regardless, the documents say that “HSI INTEL requires Penlink's Tangles and Weblocas [sic] an integral part of their investigations mission.” Although HSI has historically been focused on criminal investigations, 90 percent of HSI have been diverted to carry out immigration enforcement, according to data published by the Cato Institute. Meaning it is unclear whether use of the data will be limited to criminal investigations or not.

After this article was published, DHS Assistant Secretary Tricia McLaughlin told 404 Media in a statement “DHS is not going to confirm or deny law enforcement capabilities or methods. The fact of the matter is the media is more concerned with peddling narratives to demonize ICE agents who are keeping Americans safe than they are with reporting on the criminals who have victimized our communities.” This is a boilerplate statement that DHS has repeatedly provided 404 Media when asked about public documents detailing the agency’s surveillance capabilities, and which inaccurately attacks the media.

In 2020, The Wall Street Journal first revealed that ICE and CBP were using commercially smartphone location data to investigate various crimes and for border enforcement. I then found CBP had a $400,000 contract with a location data broker and that the data it bought access to was “global.” I also found a Muslim prayer app was selling location data to a data broker whose clients included U.S. military contractors.

In October 2023, the Department of Homeland Security (DHS) Inspector General published a report that found ICE, CBP, and the Secret Service all broke the law when using location data harvested from phones. The oversight body found that those DHS components did not have sufficient policies and procedures in place to ensure that the location data was used appropriately. In one case, a CBP official used the technology to track the location of coworkers, the report said.

The report recommended that CBP stop its use of such data; CBP said at the time it did not intend to renew its contracts anyway. The Inspector General also recommended that ICE stop using such data until it obtained the necessary approvals. But ICE’s response in the report said it would continue to use the data. “CTD is an important mission contributor to the ICE investigative process as, in combination with other information and investigative methods, it can fill knowledge gaps and produce investigative leads that might otherwise remain hidden. Accordingly, continued use of CTD enables ICE HSI to successfully accomplish its law enforcement mission,” the response at the time said.

In January 2024, ICE said it had stopped the purchase of such “commercial telemetry data,” or CTD, which is how DHS refers to location data.

Update: this piece has been updated with a statement from DHS.


#News #x27


La UE sta per svuotare di significato il consenso sui cookies. L'analisichiarissima di @Matteo G.P. Flora

@Etica Digitale (Feddit)

Addio ai fastidiosi popup? Sì, ma il rischio è perdere davvero il controllo sui tuoi dati: il consenso diventa un click nascosto nelle impostazioni, e il tracciamento dei big del web vola. Secondo la Commissione Europea, questa mossa dovrebbe alleggerire del 25% il peso normativo, ma il consenso informato rischia di diventare solo una formalità.

Se passa, potresti non dover più cliccare niente… ma tutto quello che viene tracciato su di te finirà direttamente nei data center delle Big Tech, pronto per essere venduto e sfruttato senza il tuo reale permesso.

Vale davvero la pena scambiare meno fastidi per meno libertà digitale? Sei pro semplificazione o pro trasparenza?

youtu.be/tDRlipjE2W0

in reply to The Privacy Post

ricordo che i banner sono fastidiosi e scomodi perché sono stati progettati (da Big Tech, non dalla CE) per essere fastidiosi e scomodi.

Ciccio dell’Oca reshared this.



Riceviamo e pubblichiamo: Ministero della Salute Palestinese – Gaza
Rapporto statistico quotidiano sulle vittime e i feriti dell’aggressione israeliana alla Striscia di Gaza
Aggiornato al 30 settembre 2025
Ultime 24 ore:
• Sono arrivati agli ospedali della Striscia di Gaza 42 martiri e 190 feriti.
• Numerose vittime rimangono ancora sotto le macerie o per le strade, impossibili da raggiungere a causa dell’intensità dei bombardamenti e del collasso dei servizi di soccorso e protezione civile.

Bilancio complessivo dell’aggressione (dal 7 ottobre 2023):
• Totale martiri: 66.097
• Totale feriti: 168.536
Bilancio dal 18 marzo 2025 ad oggi:
• Martiri: 13.229
• Feriti: 56.495

Vittime tra coloro che cercavano aiuti umanitari (“martiri del pane”):
• Nelle ultime 24 ore, sono arrivati agli ospedali 5 martiri e 56 feriti mentre tentavano di accedere agli aiuti alimentari.
• Il bilancio totale sale a:
➤ 2.576 martiri
➤ Oltre 18.873 feriti

Morti per fame e malnutrizione:
Secondo i dati ufficiali del Ministero della Salute a Gaza:
• Il numero totale delle vittime causate dalla carestia e dalla malnutrizione ha raggiunto 453 martiri, tra cui 150 bambini.
• Dalla dichiarazione ufficiale di carestia da parte dell’IPC (Integrated Food Security Phase Classification), sono stati registrati:
➤ 175 decessi, tra cui 35 bambini, fino alla data odierna.

Appello urgente:
Il Ministero della Salute e le autorità palestinesi rinnovano l’appello alla comunità internazionale, alle organizzazioni umanitarie e ai media affinché:
• Si imponga un cessate il fuoco immediato e duraturo
• Si garantisca l’ingresso sicuro e incondizionato degli aiuti umanitari
• Si denunci pubblicamente l’uso della fame come arma di guerra, in flagrante violazione del diritto internazionale umanitario

Questo rapporto è pubblicato a fini di documentazione, trasparenza e per sollecitare un’azione urgente da parte della comunità internazionale.
Ministero della Salute Palestinese – Gaza
30 settembre 2025

Gazzetta del Cadavere reshared this.



The Secretary of War lectured America’s generals on fitness standards, beards, and warriors for an hour.#News #military


In Unhinged Speech, Pete Hegseth Says He's Tired of ‘Fat Troops,’ Says Military Needs to Go Full AI


Last week, Secretary of War Pete Hegseth called America’s Generals to Quantico to meet for an unknown reason. America’s top civilian military leader calling the generals home all at once is strange and unprecedented. It’s the kind of move that often presages something like a major war. But that’s not what he wanted. During a bizarre, unhinged speech before America’s military leadership, Hegseth focused almost entirely on the culture wars and called for the restoration of what he called a “warrior ethos.” He said some of America’s generals are fat, demanded the Pentagon go all in on AI, whined about beards and accountability, told the troops they “kill people and break things for a living,” and plugged his book.

“The speech today is about the nature of ourselves,” Hegseth said. For the next hour, before setting up President Trump for remarks, Hegseth spoke about a new American military that will shave its beards, reduce the number of women in combat, and focus on killing. “To our enemies: FAFO. If necessary, our troops can translate that for you. Peace through strength, brought to you by the warrior ethos.”(FAFO means fuck around and find out.)
playlist.megaphone.fm?p=TBIEA2…
An earlier theme of the speech was more and faster. “This urgent moment, of course, requires more troops, more munitions, more drones, more [Patriot missiles], more submarines, more B-21 bombers,” Hegseth said. “It requires more innovation, more AI in everything and ahead of the curve, more cyber effects, more counter [unmanned aerial systems], more space, more speed. America is the strongest, but we need to get stronger and quickly.”

The alarming speech took most of the attention of social media Tuesday morning and comes at a time where Donald Trump has deployed troops in American cities, has threatened to invade Portland, and told the military they should use American cities as a “training ground.” Hegseth himself has been said to be more or less having a meltdown, according to reporting by The Daily Mail.

The Pentagon has been all in on AI and drones for years now, but it hasn’t gone well. Last week, The Wall Street Journal reported that the Pentagon is struggling to deploy AI weapons and is worried about catching up to China. A Biden era initiative called Replicator was meant to help bridge the gap between dreams and reality, but hasn’t worked fast enough for its critics. So the Pentagon is turning the project over to Special Operations Command—the part of the Pentagon in charge of its operators—under a new division called Defense Autonomous Warfare Group (DAWG). This means that the military leaders who run SEAL Team Six will soon be in charge of getting AI controlled drone swarms to the troops.

Much of Hegseth’s speech was about aesthetics and fitness. For him, a return to the “warrior ethos” meant never seeing a fat general or admiral ever again. “Every member of the joint force at any rank is required to take a PT test twice a year as well as meet height and weight requirements twice a year, every year of service,” he said. “Also today, at my direction, every warrior across our joint force is required to do PT every duty day. Should be common sense…but we’re codifying it. And we’re not talking hot yoga and stretching. Real hard PT, either as a unit or an individual. At every level, from the Joint Chiefs to everyone in this room to the lowest private.”

“It all starts with physical fitness and appearance,” Hegseth said. “If the Secretary of War can do regular, hard PT, so can every member of our joint force. Frankly, it's tiring to look out at combat formations, or really any formation, and see fat troops. Likewise, it's completely unacceptable to see fat generals and admirals in the halls of the Pentagon and leading commands around the country in the world, it's a bad look. It is bad and it's not who we are.”

Hegseth’s aesthetic concerns extended to facial hair. “This also means grooming standards. No more beards. Long hair. Superficial individual expression. We’re going to cut our hair, shave our beards, and adhere to standards. It’s like the broken windows theory of policing. When you let the small stuff go, the big stuff eventually goes. So you have to address the small stuff,” he said.

There was, of course, a carve out for America’s operators. “ If you want a beard you can join Special Forces. If not, then shave. We don’t have a military full of Nordic Pagans. At my direction, the era of unprofessional appearance is over. No more beardos. The era of rampant and ridiculous shaving profiles is done.”

Beards may seem like small stuff in the grand scheme of things, but it’s a hot topic among military recruits. Over the past few years, military recruits have fought and won exemptions for grooming standards based on their religion, often in court. A federal court told the Marine Corps it couldn't force Sikh recruits to shave in 2022. There’s also medical issues. Men with pseudofolliculitis barbae, a condition that causes painful ingrown hairs and razor burn after shaving, have gotten long gotten waivers to exempt them from shaving in the military. Around 60 percent of black men have pseudofolliculitis barbae.

💡
Do you know anything else about this story? I would love to hear from you. Using a non-work device, you can message me securely on Signal at +1 347 762-9212 or send me an email at matthew@404media.co.

Hegseth made it clear that these new conditions mean there will be fewer women on the frontlines and in physically demanding roles. “I don’t want my son serving alongside troops who are out of shape or in combat units with females who can’t meet the same combat arm physical standards as men,” he said. “When it comes to any job that requires physical power to perform in combat, those physical standards must be high and gender neutral. If women can make it excellent,” he said. “If not, it is what it is. If that means no women qualify for some combat jobs. So be it, that is not the intent, but it could be the result.”

The Secretary also said he would end the tyranny of accountability in the military. “We are overhauling an Inspector General process, the IG that has been weaponized, putting complainers, ideologues and poor performers in the driver's seat,” he said. “We're doing the same with the Equal Opportunity and Military Equal Opportunity policies. The EO and MEO at our department. No more frivolous complaints, no more anonymous complaints, no more repeat complaints. No more smearing reputations. No more endless waiting. No more legal limbo. No more side-tracking careers, no more walking on eggshells.”

Pentagon acting Inspector General Steven Stebbins is currently investigating Hegseth over his use of an unsecured Signal clone to plan military operations.

A modern military is a technological and logistics machine. A warrior takes many shapes and, if Hegseth wants to go all in on cyber, drones, and AI, then harsh grooming standards and increased physical fitness requirements will cut off many of the brightest minds who could help him fulfill that goal.

That doesn’t seem to matter to Hegseth and Trump as much as aesthetics does. Towards the end of his speech, the Secretary said the Pentagon lost its way. Then he plugged his 2024 book The War on Warriors. “We became the woke department, but not anymore. No more identity months, DEI offices, dudes in dresses. No more climate change worship. No more division, distraction, or gender delusions. No more debris. As I’ve said before and will say again: we are done with that shit,” he said.

“You might say we’re ending the war on warriors. I hear someone wrote a book about that.”




Pubblicate oggi le graduatorie che assegnano 210 milioni a oltre 1.000 istituti tecnici e professionali in tutta Italia.








IL PARLAMENTO METTA UN FRENO ALLA CONCENTRAZIONE DI POTERI NELLE MANI DI GUALTIERI


Oggi pomeriggio abbiamo depositato alla Camera dei deputati 24 mila firme che chiedono la fine dei poteri speciali di Gualtieri che beneficia di una concentrazione di potere senza precedenti cumulando ruolo e funzioni di Sindaco di Roma, di Sindaco della Città metropolitana e di Commissario straordinario di governo al Giubileo con poteri illimitati in materia di rifiuti. Come è arcinoto, i poteri straordinari relativi ai rifiuti sono attributi per affrontare l’afflusso dei pellegrini del Giubileo 2025 che però è sta per finire. Poteri concentrati nelle mani di Gualtieri che, da subito, li ha utilizzati in spregio alle normative di settore anche di derivazione europea per impianti che con il Giubileo non c’entrano quindi nulla e rispetto ai quali, come nel caso dell’inceneritore, in campagna elettorale si era pubblicamente dichiarato contrario in un confronto con lo sfidante Calenda.

Oggi pomeriggio davanti al Palazzo di Montecitorio abbiamo innalzato lo striscione che riafferma davanti alla Camera dei deputati che, con il Senato, approva le leggi il principio costituzionale per il quale tutti sono eguali davanti alla legge. Non a Roma dove da tre anni esatti non è così perché Roberto Gualtieri in quanto Commissario con poteri speciali può impunemente violare le leggi. Questo accade perché finora non abbiamo trovato un giudice coraggioso capace di portare la norma attributiva dei poteri davanti alla Corte costituzionale.

Allora siamo quindi tornati alla Camera, presto torneremo al Senato perché quella norma il Parlamento l’ha scritta e il Parlamento dovrà cambiarla perché una concentrazione di potere nelle mani di uno solo viola il principio democratico e non può quindi più essere tollerata laddove ci si riconosca nei principi della Costituzione della Repubblica italiana.

Con noi oggi c’erano e hanno preso lo striscione i deputati Francesco Emilio Borrelli, Filiberto Zaratti e Andrea Volpi, Sindaco di Lanuvio, unitamente ai Sindaci di Albano, Massimiliano Borelli, di Ardea, Maurizio Cremonini, di Ariccia Gianluca Staccoli e di Genzano Carlo Zoccolotti. I consiglieri regionali Alessandra Zeppieri e Adriano Zuccala, i consiglieri comunali di Albano Salvatore Tedone, di Pomezia Giacomo Castro e Luisa Navisse e Marco Cerisola consigliere del Municipio IX.

L’Unione dei Comitati contro l’inceneritore



Il messaggio di Nave Alpino alla Global Sumud Flotilla


@Giornalismo e disordine informativo
articolo21.org/2025/09/il-mess…
Questo pomeriggio la nave Alpino della Marina Militare italiana, che segue la flotta, ha diramato un avviso ufficiale a tutte le imbarcazioni, dichiarandosi disponibile ad accogliere ogni persona che manifesti



#Gaza, una trappola chiamata pace


altrenotizie.org/primo-piano/1…


Il campo profughi di Jenin. Il reportage sulla Cisgiordania


@Giornalismo e disordine informativo
articolo21.org/2025/09/il-camp…
Si conclude con il campo profughi di Jenin il reportage esclusivo per Articolo 21 di Sandra Cecchi, giornalista Rai (ex TG2) di ritorno dai Territori occupati. Quel che resta del campo profughi di




cgiltoscana.it/2025/09/30/cgil…


Ahead of the European Union's Regulation on Transparency and Targeting of Political Advertising, Google's Ad Transparency Center no longer shows political ads from any countries in the EU.

Ahead of the European Unionx27;s Regulation on Transparency and Targeting of Political Advertising, Googlex27;s Ad Transparency Center no longer shows political ads from any countries in the EU.#advertising #Google


Google Just Removed Seven Years of Political Advertising History from 27 Countries


Google’s Ad Transparency tool no longer shows political online advertisements that ran on its platforms, in the past or present, from any countries in the European Union, making seven years of data from 27 different countries inaccessible.

Liz Carolan, who publishes Irish technology and politics newsletter The Briefing, spotted the change on September 28. Carolan noticed that until last week, Google’s Ad Transparency tool would allow visitors to search ads that have run in countries in the EU going back to 2018, including data about who was targeted, how much was spent on each ad, and for what candidates or parties. This week, political ads from Ireland as well as the other 26 countries in the EU are gone from the Ad Transparency political ads country selection page.

“We had been told that Google would try to stop people placing political ads, a ‘ban’ that was to come into effect this week. I did not read anywhere that this would mean the erasure of this archive of our political history,” Carolan wrote.

The change is in response to the EU’s upcoming Regulation on Transparency and Targeting of Political Advertising (TTPA), a law set to enter full force on October 10. The TTPA lays out new regulations for advertisers in the EU, including requirements that political ads “must be clearly labelled as such and include information on who paid for it, to which election, referendum, legislative or regulatory process it is linked and whether targeting or ad-delivery techniques have been used,” according to an EU summary of the law, and limits targeting and ad delivery of political advertising to strict conditions, including requiring consent from ads’ targets that their data be used for political advertising. Certain categories of demographic data, like racial or ethnic origin or political opinions, can’t be used for profiling by advertisers.

On August 5, Google posted new guidelines for political ads in EU countries, and said that past ads would still be accessible in the Transparency Center: “As of September 2025, the EU Political Ads Transparency report will be no longer available. However, EU Election Ads previously shown in the Political Ads Transparency Report will remain publicly accessible in the Ads Transparency Center, subject to retention policies.”

In July, Meta also announced it would no longer allow “political, electoral and social issue ads” on its platforms in the EU, “given the unworkable requirements and legal uncertainties” introduced by the TTPA. Past ads from the EU are still visible on Meta’s ad library.

The law dictates that online ads will be available in “an online European repository,” but that repository hasn’t launched yet. Researchers and journalists rely on tools like Google’s Ad Transparency platform and Meta’s similar platform for information on who was running political ads and how; now, they’ll have to wait for that repository to launch.

Google announced in November 2024 that it would stop serving political ads in the EU in October 2025, ahead of the TTPA. “Additionally, paid political promotions, where they qualify as political ads under the TTPA, will no longer be permitted on YouTube in the EU,” Google’s Vice President for Government Affairs and Public Policy for Europe Annette Kroeber-Riel wrote in a company blog post.

“The European Union’s upcoming Regulation on Transparency and Targeting of Political Advertising (TTPA) unfortunately introduces significant new operational challenges and legal uncertainties for political advertisers and platforms,” Kroeber-Riel wrote. “For example, the TTPA defines political advertising so broadly that it could cover ads related to an extremely wide range of issues that would be difficult to reliably identify at scale. There is also a lack of reliable local election data permitting consistent and accurate identification of all ads related to any local, regional or national election across any of 27 EU Member States. And key technical guidance may not be finalized until just months before the regulation comes into effect.” The law is vague, but doesn’t specifically require platforms to delete past ads. It’s likely that many of the ads stored by Google in the Transparency Center would be in violation of the law today, however; instead of combing through hundreds of thousands of ads, it’s possible Google just removed the entire EU.

Google did not respond to 404 Media’s request for comment.
playlist.megaphone.fm?p=TBIEA2…




Lawyers blame IT, family emergencies, their own poor judgment, their assistants, illness, and more.#AI #Lawyers #law


18 Lawyers Caught Using AI Explain Why They Did It


Earlier this month, an appeals court in California issued a blistering decision and record $10,000 fine against a lawyer who submitted a brief in which “nearly all of the legal quotations in plaintiff’s opening brief, and many of the quotations in plaintiff’s reply brief, are fabricated” through the use of ChatGPT, Claude, Gemini, and Grok. The court said it was publishing its opinion “as a warning” to California lawyers that they will be held responsible if they do not catch AI hallucinations in their briefs.

In that case, the lawyer in question “asserted that he had not been aware that generative AI frequently fabricates or hallucinates legal sources and, thus, he did not ‘manually verify [the quotations] against more reliable sources.’ He accepted responsibility for the fabrications and said he had since taken measures to educate himself so that he does not repeat such errors in the future.”

As the judges remark in their opinion, the use of generative AI by lawyers is now everywhere, and when it is used in ways that introduce fake citations or fake evidence, it is bogging down courts all over America (and the world). For the last few months, 404 Media has been analyzing dozens of court cases around the country in which lawyers have been caught using generative AI to craft their arguments, generate fictitious citations, generate false evidence, cite real cases but misinterpret them, or otherwise take shortcuts that has introduced inaccuracies into their cases. Our main goal was to learn more about why lawyers were using AI to write their briefs, especially when so many lawyers have been caught making errors that lead to sanctions and that ultimately threaten their careers and their standings in the profession.

To do this, we used a crowdsourced database of AI hallucination cases maintained by the researcher Damien Charlotin, which so far contains more than 410 cases worldwide, including 269 in the United States. Charlotin’s database is an incredible resource, but it largely focuses on what happened in any individual case and the sanctions against lawyers, rather than the often elaborate excuses that lawyers told the court when they were caught. Using Charlotin’s database as a starting point, we then pulled court records from around the country for dozens of cases where a lawyer offered a formal explanation or apology. Pulling this information required navigating clunky federal and state court record systems and finding and purchasing the specific record where the lawyer in question tried to explain themselves (these were often called “responses to order to show cause.”) We also reached out to lawyers who were sanctioned for using AI to ask them why they did it. Very few of them responded, but we have included explanations from the few who did.

What we found was incredibly fascinating, and reveals a mix of lawyers blaming IT issues, personal and family emergencies, their own poor judgment and carelessness, and demands from their firms and the industry to be more productive and take on more casework. But most often, they simply blame their assistants.

Few dispute that the legal industry is under great pressure to use AI. Legal giants like Westlaw and LexisNexis have pitched bespoke tools to law firms that are now regularly being used, but Charlotin’s database makes clear that lawyers are regularly using off-the-shelf generalized tools like ChatGPT and Gemini as well. There’s a seemingly endless number of startups selling AI legal tools that do research, write briefs, and perform other legal tasks. While working on this article, it became nearly impossible to keep up with new cases of lawyers being sanctioned for using AI. Charlotin has documented 11 new cases within the last week alone.

This article is the first of several 404 Media will write exploring the use of AI in the legal profession. If you’re a lawyer and have thoughts or firsthand experiences, please get in touch. Some of the following anecdotes have been lightly edited for clarity.

💡
Are you a lawyer or do you work in the legal industry? We want to know how AI is impacting the industry, your firm, and your job. Using a non-work device, you can message me securely on Signal at jason.404. Otherwise, send me an email at jason@404media.co.

A lawyer in Indiana blames the court (Fake case cited)

A judge stated that the lawyer “took the position that the main reason for the errors in his brief was the short deadline (three days) he was given to file it. He explained that, due to the short timeframe and his busy schedule, he asked his paralegal (who once was, but is not currently, a licensed attorney) to draft the brief, and did not have time to carefully review the paralegal's draft before filing it.”

A lawyer in New York blamed vertigo, head colds, and malware

"He acknowledges that he used Westlaw supported by Google Co-Pilot which is an artificial intelligence-based tool as preliminary research aid." The lawyer “goes on to state that he had no idea that such tools could fabricate cases but acknowledges that he later came to find out the limitation of such tools. He apologized for his failure to identify the errors in his affirmation, but partly blames ‘a serious health challenge since the beginning of this year which has proven very persistent which most of the time leaves me internally cold, and unable to maintain a steady body temperature which causes me to be dizzy and experience bouts of vertigo and confusion.’ The lawyer then indicates that after finding about the ‘citation errors’ in his affirmation, he conducted a review of his office computer system and found out that his system was ‘affected by malware and unauthorized remote access.’ He says that he compared the affirmation he prepared on April 9, 2025, to the affirmation he filed to [the court] on April 21, 2025, and ‘was shocked that the cases I cited were substantially different.’”

A lawyer in Florida blames a paralegal and the fact they were doing the case pro bono (Fake cases and hallucinated quotes)

The lawyer “explained that he was handling this appeal pro bono and that as he began preparing the brief, he recognized that he lacked experience in appellate law. He stated that at his own expense, he hired ‘an independent contractor paralegal to assist in drafting the answer brief.’ He further explained that upon receipt of a draft brief from the paralegal, he read it, finalized it, and filed it with this court. He admitted that he ‘did not review the authority cited within the draft answer brief prior to filing’ and did not realize it contained AI generated content.

A lawyer in South Carolina said he was rushing (Fake cases generated by Microsoft CoPilot)

“Out of haste and a naïve understanding of the technology, he did not independently verify the sources were real before including the citations in the motion filed with the Court seeking a preliminary injunction”

A lawyer in Hawaii blames a New Yorker they hired

This lawyer was sanctioned $100 by a court for one AI-generated case, as well as quoting multiple real cases and misattributing them to that fake case. They said they had hired a per-diem attorney—“someone I had previously worked with and trusted,” they told the court—to draft the case, and though they “did not personally use AI in this case, I failed to ensure every citation was accurate before filing the brief.” The Honolulu Civil Beat reported that the per-diem attorney they hired was from New York, and that they weren’t sure if that attorney had used AI or not.

The lawyer told us over the phone that the news of their $100 sanction had blown up in their district thanks to that article. “ I was in court yesterday, and of course the [opposing] attorney somehow brought this up,” they said in a call. According to them, that attorney has also used AI in at least seven cases. Nearly every lawyer is using AI to some degree, they said; it’s just a problem if they get caught. “The judges here have seen it extensively. I know for a fact other attorneys have been sanctioned. It’s public, but unless you know what to search for, you’re not going to find it anywhere. It’s just that for some stupid reason, my matter caught the attention of a news outlet. It doesn’t help with business.”

A lawyer in Arizona blames someone they hired

A judge wrote “this is a case where the majority of authorities cited were either fabricated, misleading, or unsupported. That is egregious … this entire litigation has been derailed by Counsel’s actions. The Opening Brief was replete with citation-related deficiencies, including those consistent with artificial intelligence generated hallucinations.”

The attorney claimed “Neither I nor the supervising staff attorney knowingly submitted false or non-existent citations to the Court. The brief writer in question was experienced and credentialed, and we relied on her professionalism and prior performance. At no point did we intend to mislead the Court or submit citations not grounded in valid legal authority.”

A lawyer in Louisiana blames Westlaw (a legal research tool)

The lawyer “acknowledge[d] the cited authorities were inaccurate and mistakenly verified using Westlaw Precision, an AI-assisted research tool, rather than Westlaw’s standalone legal database.” The lawyer further wrote that she “now understands that Westlaw Precision incorporates AI-assisted research, which can generate fictitious legal authority if not independently verified. She testified she was unable to provide the Court with this research history because the lawyer who produced the AI-generated citations is currently suspended from the practice of law in Louisiana:

“In the interest of transparency and candor, counsel apologizes to the Court and opposing counsel and accepts full responsibility for the oversight. Undersigned counsel now understands that Westlaw Precision incorporates AI-assisted research, which can generate fictitious legal authority if not independently verified. Since discovering the error, all citations in this memorandum have been independently confirmed, and a Motion for Leave to amend the Motion to Transfer has been filed to withdraw the erroneous citations. Counsel has also implemented new safeguards, including manual cross-checking in non AI-assisted databases, to prevent future mistakes.”

“At the time, undersigned counsel understood these authorities to be accurate and reliable. Undersigned counsel made edits and finalized the pleading but failed to independently verify every citation before filing it. Undersigned counsel takes responsibility for this oversight.

Undersigned counsel wants the Court to know that she takes this matter extremely seriously. Undersigned counsel holds the ethical obligations of our profession in the highest regard and apologizes to opposing counsel and the Court for this mistake. Undersigned counsel remains fully committed to the ethical obligations as an officer of the court and the standards expected by this Court going forward, which is evidenced by requesting leave to strike the inaccurate citations. Most importantly, undersigned counsel has taken steps to ensure this oversight does not happen again.”

A lawyer in New York says the death of their spouse distracted them

“We understand the grave implications of misreporting case law to the Court. It is not our intention to do so, and the issue is being investigated internally in our office,” the lawyer in the case wrote.

“The Opposition was drafted by a clerk. The clerk reports that she used Google for research on the issue,” they wrote. “The Opposition was then sent to me for review and filing. I reviewed the draft Opposition but did not check the citations. I take full responsibility for failing to check the citations in the Opposition. I believe the main reason for my failure is due to the recent death of my spouse … My husband’s recent death has affected my ability to attend to the practice of law with the same focus and attention as before.”

A lawyer in California says it was ‘a legal experiment’

This is a weird one, and has to do with an AI-generated petition filed three times in an antitrust lawsuit brought against Apple by the Coronavirus Reporter Corporation. The lawyer in the case explained that he created the document as a “legal experiment.” He wrote:

“I also ‘approved for distribution’ a Petition which Apple now seeks to strike. Apple calls the Petition a ‘manifesto,’ consistent with their five year efforts to deride us. But the Court should be aware that no human ever authored the Petition for Tim Cook’s resignation, nor did any human spend more than about fifteen minutes on it. I am quite weary of Artificial Intelligence, as I am weary of Big Tech, as the Court knows. We have never done such a test before, but we thought there was an interesting computational legal experiment here.

Apple has recently published controversial research that AI LLM's are, in short, not true intelligence. We asked the most powerful commercially available AI, ChatGPT o3 Pro ‘Deep Research’ mode, a simple question: ‘Did Judge Gonzales Rogers’ rebuke of Tim Cook’s Epic conduct create a legally grounded impetus for his termination as CEO, and if so, write a petition explaining such basis, providing contextual background on critics’ views of Apple’s demise since Steve Jobs’ death.’ Ten minutes later, the Petition was created by AI. I don't have the knowledge to know whether it is indeed 'intelligent,' but I was surprised at the quality of the work—so much so that (after making several minor corrections) I approved it for distribution and public input, to promote conversation on the complex implications herein. This is a matter ripe for discussion, and I request the motion be granted.”

Lawyers in Michigan blame an internet outage

“Unfortunately, difficulties were encountered on the evening of April 4 in assembling, sorting and preparation of PDFs for the approximately 1,500 pages of exhibits due to be electronically filed by Midnight. We do use artificial intelligence to supplement their research, along with strict verification and compliance checks before filing.

AI is incorporated into all of the major research tools available, including West and Lexis, and platforms such as ChatGPT, Claude, Gemini, Grok and Perplexity. [We] do not rely on AI to write our briefs. We do include AI in their basic research and memorandums, and for checking spelling, syntax, and grammar. As Midnight approached on April 4, our computer system experienced a sudden and unexplainable loss of internet connection and loss of connection with the ECF [e-court filing] system … In the midst of experiencing these technical issues, we erred in our standard verification process and missed identifying incorrect text AI put in parentheticals in four cases in footnote 3, and one case on page 12, of the Opposition.”

Lawyers in Washington DC blame Grammarly, ProWritingAid, and an IT error

“After twenty years of using Westlaw, last summer I started using Lexis and its protege AI product as a natural language search engine for general legal propositions or to help formulate arguments in areas of the law where the courts have not spoken directly on an issue. I have never had a problem or issue using this tool and prior to recent events I would have highly recommended it. I failed to heed the warning provided by Lexis and did not double check the citations provided. Instead, I inserted the quotes, caselaw and uploaded the document to ProWritingAid. I used that tool to edit the brief and at one point used it to replace all the square brackets ( [ ) with parentheses.

In preparing and finalizing the brief, I used the following software tools: Pages with Grammarly and ProWritingAid ... through inadvertence or oversight, I was unaware quotes had been added or that I had included a case that did not actually exist … I immediately started trying to figure out what had happened. I spent all day with IT trying to figure out what went wrong.”

A lawyer in Texas blames their email, their temper, and their legal assistant

“Throughout May 2025, Counsel's office experienced substantial technology related problems with its computer and e-mail systems. As a result, a number of emails were either delayed or not received by Counsel at all. Counsel also possesses limited technological capabilities and relies on his legal assistant for filing documents and transcription - Counsel still uses a dictation phone. However, Counsel's legal assistant was out of the office on the date Plaintiffs Response was filed, so Counsel's law clerk had to take over her duties on that day (her first time filing). Counsel's law clerk had been regularly assisting Counsel with the present case and expressed that this was the first case she truly felt passionate about … While completing these items, Counsel's law clerk had various issues, including with sending opposing counsel the Joint Case Management Plan which required a phone conference to rectify. Additionally, Counsel's law clerk believed that Plaintiff’s Response to Defendant's Motion to Dismiss was also due that day when it was not.

In midst of these issues, Counsel - already missing his legal assistant - became frustrated. However, Counsel's law clerk said she had already completed Plaintiff's Response and Counsel immediately read the draft but did not thoroughly examine the cases cited therein … unbeknownst to Counsel and to his dismay, Counsel's law clerk did use artificial intelligence in drafting Plaintiff's Response. Counsel immediately instituted a strict policy prohibiting his staff from using artificial intelligence without exception - Counsel doesn't use artificial intelligence, so neither shall his staff.

Second, Counsel now requires any staff assisting in drafting documents to provide Counsel with a printout of each case cited therein with the passage(s) being relied on highlighted or marked.”

The lawyer also submitted an invoice from a company called Mainframe Computers for $480 which include line items for “Install office,” “printer not working and computer restarting,” “fixes with email and monitors and default fonts,” and “computer errors, change theme, resolution, background, and brightness.”

This post is for subscribers only


Become a member to get access to all content
Subscribe now


Law & Justice Channel reshared this.




European Innovation Act: l’Europa ascolta, l’Italia deve parlare

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Fini e tempi dell'European Innovation Act. L'intervento di Gianmarco Gabrieli, amministratore di Agora Tech



Dry Cleaning: il 2026 comincia portando il loro nuovo album
freezonemagazine.com/news/dry-…
Secret Love è la migliore espressione delle profonde amicizie che hanno dato vita ai Dry Cleaning, tra la frontwoman Florence Shaw, il chitarrista Tom Dowse, il batterista Nick Buxton e il bassista Lewis Maynard. Qui, il quartetto del sud di Londra si colloca nell’avanguardia del rock, catalizzando la paranoia reaganiana del punk e


Perché Visa sta puntando sulle stablecoin

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Visa sta testando un programma per l'utilizzo delle stablecoin nei pagamenti transfrontalieri. È l'ennesima conferma dell'avvicinamento tra la finanza tradizionale e il settore delle crypto. Tutti i dettagli.

startmag.it/innovazione/visa-s…