Salta al contenuto principale




Accolgo: il progetto dell’Ue a sostegno delle famiglie ucraine con bambini affetti da tumore

[quote]Video-inchiesta di Elisa Ortuso con il quale ha vinto il Premio Megalizzi-Niedzielski 2025 della Ue rivolto ai giovani giornalisti
L'articolo Accolgo: il progetto dell’Ue a sostegno delle famiglie ucraine con bambini affetti da tumore su




Nuovo stop al processo Regeni: gli atti vanno alla Consulta


@Giornalismo e disordine informativo
articolo21.org/2025/10/nuovo-s…
La Corte d’Assise di Roma ha deciso di sospendere il processo per la morte di Giulio Regeni, disponendo l’invio degli atti alla Corte Costituzionale. La decisione è legata a una questione di



Cybersicurezza. Piroddi (Aruba Academy): “Sfida culturale che richiede competenze e collaborazione”


@Informatica (Italy e non Italy 😁)
La crescente complessità del contesto digitale deve procedere di pari passo con una maggiore consapevolezza della sicurezza digitale: in Italia nel 2024 sono stati registrati 357 incidenti gravi e oltre il 10% degli



trump è riuscito a fare un danno serio... apparire come debole e incostante, e quindi in definitiva inefficace. la usa politica ondivaga questo produce: un danno di immagine. ma non è utile alla nostra causa. non c'è da rallegrarsene. bene o male al momento dipendiamo ancora noi europei dalla deterrenza usa. e certo pacifismo è utile solo a putin.

qr.ae/pCs2ln



Built-In Batteries: a Daft Idea With an Uncertain Future


Having a gadget’s battery nestled snugly within the bowels of a device has certain advantages. It finally solves the ‘no batteries included’ problem, and there is no more juggling of AA or AAA cells, nor their respective chargers. Instead each device is paired to that one battery that is happily charged using a standardized USB connector, and suddenly everything is well in the world.

Everything, except for the devices that cannot be used while charging, wireless devices that are suddenly dragging along a wire while charging and which may have charging ports in irrational locations, as well as devices that would work quite well if it wasn’t for that snugly embedded battery that’s now dead, dying, or on fire.

Marrying devices with batteries in this manner effectively means tallying up all the disadvantages of the battery chemistries and their chargers, adding them to the device’s feature list, and limiting their effective lifespan in the process. It also prevents the rapid swapping with fresh batteries, which is why everyone is now lugging chunky powerbanks around instead of spare batteries, and hogging outlets with USB chargers. And the task of finding a replacement for non-standardized pouch cell batteries can prove to be hard or impossible.

Looking at the ‘convenience’ argument from this way makes one wonder whether it is all just marketing that we’re being sold. Especially in light of the looming 2027 EU regulation on internal batteries that is likely to wipe out the existence of built-in batteries with an orbital legal strike. Are we about to say ‘good riddance’ to a terrible idea?

Not Very Pro

The Nikon EL-EN15 battery.The Nikon EL-EN15 battery.
To further rub in how much of a terrible idea built-in batteries are, one only has to look at professional equipment, particularly in the audiovisual world. Whether we are talking about DSLRs, mirror-less cameras, or professional video cameras, they all have as standard feature the ability to quickly swap batteries. Nikon and Canon cameras use a range of proprietary-but-standard Li-ion batteries, with Sony’s video camera batteries also used on portable studio lighting. For the super-expensive Red video cameras you can use either the massive Redvolt batteries that dangle off the side or a power adapter.

The reasoning here is simple: when you are doing a photo or film shoot you do not have time for charging, so you load up with a stash of charged batteries beforehand. As the current battery becomes drained, you pop open the battery hatch or detach the current pack and slam in a fresh battery before resuming. During moments of downtime you can put the drained batteries on the charger that you have squirreled away somewhere. This way you stay wireless and charged with zero fuss, and if you have enough batteries, zero downtime.

Even within the era of budget photo and video cameras you’d be able to do this. When it comes to my own JVC camcorder and Canon IXUS 100 IS point-and-shoot camera, both offer this feature, even if the battery swapping experience doesn’t feel as premium as with the Nikon D7200 DSLR and its EN-EL15 batteries that is used for more serious occasions. Swapping batteries with the DSLR in particular is as easy as swapping SD cards, which is to say a matter of seconds.

One might get the idea here that the main reason to stuff a pouch cell somewhere inside the device is mostly a cost-saving measure, as it omits the battery terminals and ejection mechanism for the pack.

Battery Decay


Another reason why having a built-in battery with a multi-thousand-Euro DSLR would be a terrible idea beyond the insanity of having to ‘charge the DSLR’, is that the battery will be dead long before even the warranty on the DSLR has expired, especially if you are an avoid shooter. Even if you do not use a device that much, the fact of the matter is that lithium-ion cells begin to degrade as soon as they have been manufactured. This may be acceptable in a €1,000+ smartphone when people buy a new one every other year anyway, but becomes a problem when you’d like to use a device for much longer.

A good summary of the how and why of lithium-ion batteries (LIB) can be found in this IEEE review article by Wiljan Vermeer et al. from 2021. The three main aging mechanisms are:

  • Loss of Lithium Inventory (LLI).
  • Loss of Active Material (LAM).
  • Conductivity Loss (CL).

There are multiple ways in which each type of aging can occur, with most requiring the cell to be charged and discharged, as this inflicts mechanical and other types of stress. When it comes to storing LIBs, we enter the territory of calendar aging. This has an irreversible and reversible component, the former being impacted by three components: the state of charge (SoC), temperature, and time.
Calendar aging of NMC Li-ion cells at 50 ℃ and at various SoCs. (Credit: Wiljan Vermeer, IEEE, 2021)Calendar aging of NMC Li-ion cells at 50 ℃ and at various SoCs. (Credit: Wiljan Vermeer, IEEE, 2021)
What this tells us is that although you can affect LIB calendar aging, it’s a pretty inevitable aspect of their chemistry. This is true even in the case of the lithium-polymer (LiPo) LIB type batteries with its polymer electrolyte. This effectively means that charging the battery in a device to 80% instead of 100% will give it some more life, but you’d have to drop down to 50% or less to see the big gains. It’s also highly advisable to keep the battery relatively cool, which is where fast-charging is a terrible idea, especially as the resistance of the battery goes up due to aging.

While the exact mechanisms behind calendar aging are still being investigated, it’s likely that the layer that forms at the electrochemically unstable electrolyte-electrode interface (SEI) restructures to prevent the transfer of lithium ions, effectively increasing the measured resistance via the CL aging path.

In addition to calendar aging you have the charge-discharge cycle-based aging mechanisms, which not only affects the SEI, but also causes mechanical expansion of the graphite anode material, which leads to both the LLI and LAM aging paths. When you then add in the typical charging method for gadgets like smartphones using a LIB-based powerbank, you end up with double the charge-discharge cycles over simply slotting in a fresh battery.

End Of The Road

Replacing the battery in the Samsung Galaxy Nexus. (Credit: Maya Posch)Replacing the battery in the Samsung Galaxy Nexus. (Credit: Maya Posch)
Beyond larger electronic devices, pouch cell LIBs are now integrated in countless more gadgets, from lamps to Bluetooth speakers. To address the sheer volume of these built-in LIBs, the EU’s Battery Regulation will begin to enforce its removability and replaceability requirements starting on 18 February of 2027.

The batteries which we discussed in this article fall under so-called ‘portable batteries’, meaning that it weighs less than 5 kg and is not used for an electric vehicle. These are required to make it possible for the end user to replace and remove, all without damaging or destroying the battery or the device, and without requiring any special tools. There are some partial safety-related exceptions where a professional can do said replacement, while a full exception is limited to a number of very specific device categories.

What exactly the fallout of this change will be remains to be seen, with manufacturers likely starting to adapt their products throughout 2026. Devices like smartphones, game controllers, but also Bluetooth speakers, wireless mice and portable game consoles will all be affected, so it’ll be interesting to see what approach we will see here.

Perhaps most of all what it might mean for standardization of cells and batteries, as every device that’s put on the market in the EU must have spare batteries available for reasonable cost for five years after it stops being sold. Clearly this would be cheaper if the same battery just got used for decades, somewhat like the veritable AA cell and today’s 18650 and similar formats.

So Many Standards


The process of standardization is a rough one, with sometimes the legislature leaning into the issue after consultation with a requirement, as with USB-based chargers. Other times the market simply picks something that’s readily available and does the job. One example of this is the Nokia BL-5C battery and its variations, which was quite prevalent due to Nokia using it for its phones and other platforms like the N-Gage. Consequently third-party manufacturers made their own compatible versions for use in a wide range of devices.
The Nokia BL-5C Lithium-Ion battery, this one from a Nokia N-Gage. (Credit: Evan-Amos)The Nokia BL-5C Lithium-Ion battery, this one from a Nokia N-Gage. (Credit: Evan-Amos)
While the BL-5C is still fairly large, at 53 mm x 34 mm and a thickness of 6 mm, point and shoot cameras as well as action cameras feature a range of smaller batteries, with the Canon NB-4L as used in the IXUS point and shoot cameras providing more than 750 mAh in a 35 mm x 40 mm package and a similar 5.9 mm thickness. The third-party replacements that I got of the NB-4L claim to provide 1,200 mAh, as modern LIBs tend to have more capacity within the same form factor due to more refined manufacturing.

Interestingly, even rechargeable AA-sized cells aren’t limited to NiMH chemistry any more, with Li-ion options now available yet still providing the 1.5 V one would expect. This does require a bit of electronics in the cell, and results in them having a capacity that’s similar to that of NiMH AA cells, while suffering all the aging issues of any other LIB in addition to the limited number of charge cycles. Assuming that the 1.2 V of NiMH cells is acceptable, then devices could accept AA or AAA NiMH cells.

Of note here is that none of this means that having a power input port for charging the battery or cell inside the device itself is no longer possible or allowed. Depending on the device manufacturer, the new EU regulations should mean little difference for the end user, other than having the option to pop open each device to extract and replace the battery. This could mean that wireless mice and Bluetooth headsets will soon feature an alternative to sticking in that charge cable and have the device be mostly useless until its built-in battery has soaked up sufficient juice.

Although this is an EU-only thing, it’s likely to come to every other part of the globe as well.


hackaday.com/2025/10/23/built-…



An analysis of how tools to make non-consensual sexually explicit deepfakes spread online, from the Institute for Strategic Dialogue, shows X and search engines surface these sites easily.#Deepfakes #Socialmedia


New Research Shows Deepfake Harassment Tools Spread on Social Media and Search Engines


A new analysis of synthetic intimate image abuse (SIIA) found that the tools for making non-consensual, sexually explicit deepfakes are easily discoverable all over social media and through simple searches on Google and Bing.

Research published by the counter-extremism organization Institute for Strategic Dialogue shows how tools for creating non-consensual deepfakes spread across the internet. They analyzed 31 websites for SIIA tools, and found that they received a combined 21 million visits a month, with up to four million visits in one month.

Chiara Puglielli and Anne Craanen, the authors of the research paper, used SimilarWeb to identify a common group of sites that shared content, audiences, keywords and referrals. They then used the social media monitoring tool Brandwatch to find mentions of those sites and tools on X, Reddit, Bluesky, YouTube, Tumblr, public pages on Instagram and Facebook, forums, blogs and review sites, according to the paper. “We found 410,592 total mentions of the keywords between 9 June 2020 and 3 July 2025, and used Brandwatch’s ability to separate mentions by source in order to find which sources hosted the highest volumes of mentions,” they wrote.

The easiest place to find SIIA tools was through simple web searches. “Searches on Google, Yahoo, and Bing all yielded at least one result leading the user to SIIA technology within the first 20 results when searching for ‘deepnude,’ ‘nudify,’ and ‘undress app,’” the authors wrote. Last year, 404 Media saw that Google was also advertising these apps in search results. But Bing surfaces the tools most readily: “In the case of Bing, the first results for all three searchers were SIIA tools.” These weren’t counting advertisements on the search engines that the websites would have paid for, but were organic search results surfaced by the engines’ crawlers and indexing.

X was another massively popular way these tools spread, they found: “Of 410,592 total mentions between June 2020 and July 2025, 289,660 were on X, accounting for more than 70 percent of all activity.” A lot of these were bots. “A large volume of traffic appeared to be inorganic, based on the repetitive style of the usernames, the uniformity of posts, and the uniformity of profile pictures,” Craanen told 404 Media. “Nevertheless, this activity remains concerning, as its volume is likely to attract new users to these tools, which can be employed for activities that are illegal in several contexts.”

One major spike in mentions of the tools on social media happened in early 2023 on Tumblr, when a woman posted about her experience being a target of sexual harassment from those very same tools. As targets of malicious deepfakes have said over and over again, the price of speaking up about one’s own harassment, or even objecting to the harassment of others, is the risk of drawing more attention and harassment to themselves.

‘I Want to Make You Immortal:’ How One Woman Confronted Her Deepfakes Harasser
“After discovering this content, I’m not going to lie… there are times it made me not want to be around any more either,” she said. “I literally felt buried.”
404 MediaSamantha Cole


Another spike on X in 2023 was likely the result of bot advertisements for a single SIIA tool, Craanen said, and the spike was a result of those bots launching. X has rules against “unwanted sexual conduct and graphic objectification” and “inauthentic media,” but the platform remains one of the most significant places where tools for making that content are disseminated and advertised.

Apps and sites for making malicious deepfakes have never been more common or easier to find. There have been several incidents where schoolchildren have used “undress” apps on their classmates, including last year when a Washington state high school was rocked by students using AI to take photos from other children’s Instagram accounts and “undress” around seven of their underage classmates, which police characterized as a possible sex crime against children. In 2023, police arrested two middle schoolers for allegedly creating and sharing AI-generated nude images of their 12 and 13 year old classmates, and police reports showed the preteens used an application to make the images.

A recent report from the Center for Democracy and Technology found that 40 percent of students and 29 percent of teachers said they know of an explicit deepfake depicting people associated with their school being shared in the past school year.

Laws About Deepfakes Can’t Leave Sex Workers Behind
As lawmakers propose federal laws about preventing or regulating nonconsensual AI generated images, they can’t forget that there are at least two people in every deepfake.
404 MediaSamantha Cole


The “Tools to Address Known Exploitation by Immobilizing Technological Deepfakes on Websites and Networks” (TAKE IT DOWN) Act, passed earlier this year, requires platforms to report and remove synthetic sexual abuse material, and after years of state-by-state legislation around deepfake harassment is the first federal-level law to attempt to confront the problem. But critics of that law have said it carries a serious risk of chilling legitimate speech online.

“The persistence and accessibility of SIIA tools highlight the limits of current platform moderation and legal frameworks in addressing this form of abuse. Relevant laws relating to takedowns are not yet in full effect across the jurisdictions analysed, so the impact of this legislation cannot yet be fully known,” the ISD authors wrote. “However, the years of public awareness and regulatory discussion around these tools, combined with the ease with which users can still discover, share and deploy these technologies suggests that takedowns cannot be the only tool used to counter their proliferation. Instead, effective mitigation requires interventions at multiple points in the SIIA life cycle—disrupting not only distribution but also discovery and demand. Stronger search engine safeguards, proactive content-blocking on major platforms, and coordinated international policies are essential to reducing the scale of harm.”


Social Media Channel reshared this.



Meta’s Ray-Ban glasses usually include an LED that lights up when the user is recording other people. One hobbyist is charging a small fee to disable that light, and has a growing list of customers around the country.#Privacy #Meta


A $60 Mod to Meta’s Ray-Bans Disables Its Privacy-Protecting Recording Light


The sound of power tools screech in what looks like a workshop with aluminum bubble wrap insulation plastered on the walls and ceiling. A shirtless man picks up a can of compressed air from the workbench and sprays it. He’s tinkering with a pair of Meta Ray-Ban smart glasses. At one point he squints at a piece of paper, as if he is reading a set of instructions.

Meta’s Ray-Ban glasses are the tech giant’s main attempt at bringing augmented reality to the masses. The glasses can take photos, record videos, and may soon use facial recognition to identify people. Meta’s glasses come with a bright LED light that illuminates whenever someone hits record. The idea is to discourage stalkers, weirdos, or just anyone from filming people without their consent. Or at least warn people nearby that they are. Meta has designed the glasses to not work if someone covers up the LED with tape.

That protection is what the man in the workshop is circumventing. This is Bong Kim, a hobbyist who modifies Meta Ray-Ban glasses for a small price. Eventually, after more screeching, he is successful: he has entirely disabled the white LED that usually shines on the side of Meta’s specs. The glasses’ functions remain entirely intact; the glasses look as-new. People just won’t know the wearer is recording.

This post is for subscribers only


Become a member to get access to all content
Subscribe now


reshared this



The app, which went viral before facing multiple data breaches, is currently unavailable on the Apple App Store.#tea #News


Women Dating Safety App Tea Delisted from Apple App Store


Tea, the women’s safety app which went viral earlier this year before facing multiple data breaches, has been removed from the Apple App Store.

“This app is currently not available in your country or region,” a message on the Apple App Store currently says when trying to visit a link to the app.

It is unclear whether the app has only been removed temporarily or permanently, or whether Apple banned the app or Tea removed it itself. Neither company immediately responded to a request for comment. Randy Nelson, head of insights and media resources at app intelligence company Appfigures, first alerted 404 Media to the app’s removal.

After launching a number of years ago, Tea skyrocketed to the top of the App Store this summer. The idea was for women to come together to share information and red flags about their dates. Tea users can “find verified green flag men,” “run background checks,” and “identify potential catfish,” according to Tea’s website. Crucially, the app said it verified that every user was a woman by asking them to upload a selfie.

💡
Do you know anything else about this removal? Do you work at Tea or did you used to? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

In the wake of its new found attention, members of the notorious troll and harassment forum 4chan targeted the service, and found an exposed database containing Tea users’ driver licenses and selfies. Days later, 404 Media revealed a second data breach at Tea impacted users’ direct messages, including those discussing abortions and cheating.

Tea turned off its direct messaging functionality altogether after that breach, and a Tea user filed a class action lawsuit against the app. Despite those data breaches, Tea continued to grow its userbase, Tea previously told 404 Media in a statement.
playlist.megaphone.fm?p=TBIEA2…
404 Media subsequently published an in-depth investigation into Tea and its CEO and founder Sean Cook, revealing how the app tried to essentially hijack the Are We Dating the Same Guy community, an ecosystem of Facebook pages that are credited with keeping women safe. Tea paid influencers to undermine Are We Dating the Same Guy and created competing Facebook pages with nearly identical names. That investigation also discovered a third security breach which revealed the personal data of women who were paid to promote the app as part of an affiliate program.

The app is still available on the Google Play Store. A number of other copycat apps that include “tea” in their name and advertise similar features are still available on the Apple App Store as well.

As of Wednesday Tea is still posting to its social media accounts, including its Instagram. The most recent post from around 13 hours ago describes Tea as “The first ever girls-only space that truly amplifies women’s voices and gives them an anonymous space to share their experiences, find comfort, and get the info they need on the man they’re talking to, in the name of DATING SAFETY💜”

One of the replies to that video simply says “App is gone.”


#News #tea

Breaking News Channel reshared this.



When Amazon Web Services went offline, people lost control of their cloud-connected smart beds, getting stuck in reclined positions or roasting with the heat turned all the way up.#News


The AWS Outage Bricked People’s $2,700 Smartbeds


Sleepers snoozing in Eight Sleep smartbeds had a bad night on Monday when a major outage of Amazon Web Services (AWS) caused their beds to malfunction. Some were left with the bed’s heat blasting, others were left in a sitting position and unable to recline. One woman said her bed went haywire and she had to unplug it from the wall.

At around 3 a.m. ET on Monday morning the US-EAST-1 AWS cluster went down and screwed up internet connected services across the planet. Customers for the banks Lloyds and Halifax couldn’t access their accounts. United Airlines check-ins stopped functioning. And people who rest in Eight Sleep beds awoke to find their mattresses had turned against them.

An Eight Sleep bed is a smart bed that starts at $2,700. Users provide their own mattress and Eight Sleep sells them a mattress cover and a “Pod” that acts as the brain of the system. If customers want to spend a few thousand more, they can get a base that adjusts the position of the mattress, provides biometric sleeping data, and heats and cools the sleeper. Customers must also subscribe to a service for Eight Sleep, which ranges from $17 to $33 a month.

Eight Sleep runs on the cloud and when the servers go down or the customer’s internet goes out it bricks the bed. There’s no offline mode. Customers have complained about the lack of an offline mode for a while, but the AWS outage focused their rage.
playlist.megaphone.fm?p=TBIEA2…
“So apparently, when my internet goes down, my bed decides to go on strike too. A quick outage, and boom—no change in sleep position available, not even with manual taps,” one customer on r/eightsleep said. “Maybe consider giving people a grace period before their $5,000 bed locks them into the world’s most ergonomic sitting position. AWS attack or Internet down for a few hours should not brick my bed.”

“Cloud only is unacceptable,” said another. “It’s 2025 there is no reason an internet or AWS server outage should impact your entire customer base's sleep—especially given the price tag of your product. Need EightSleep’s product team to opine here, your customer base demands it!”

“My pod is at +5 and I am sweating cuz I can’t turn it down or off,” said one comment.

Eight Sleep CEO Matteo Franceschetti apologized for the restless night in a statement posted to X. “The AWS outage has impacted some of our users since last night, disrupting their sleep. That is not the experience we want to provide and I want to apologize for it,” he said. He added that the company was restoring the bed’s features as AWS came back online and promised to outage-proof the Pods.

“Mine is still not working—it went super haywire and still seems to be turning on and off randomly with the inability to stop or control it. I had to unplug it,” ESPN host Victoria Arlen said on X, replying to Franceschetti. “I tried to get it going again and it’s still uncontrollable with the system turning on and off.”

Would be great if my bed wasn’t stuck in an inclined position due to an AWS outage. Cmon now
— Brandon (@Brandon25774008) October 21, 2025


“Would be great if my bed wasn’t stuck in an inclined position due to an AWS outage. Cmon now,” @Brandon25774008 said on X.

The truth is that so long as Eight Sleep beds have to communicate with a server to function, they’re always in danger of dying. That point of failure means the beds could go out at any time leaving the people who paid $5,000 for a fancy bed with little recourse. And, of course, no company lasts forever.

“When ES eventually goes bust, our pods will be bricked,” one Redditor said. “The fact that the pods cannot be controlled when you don’t have the internet is diabolical. I wish I knew this before purchasing. This basically means in the possibly near future, all of our pods will be bricked […] ES need to get their heads out of their ass and for once do a pro customer change and introduce an ‘offline’ mode where we can connect to the pod directly and at the very least change the temperature. It has wifi, it can make its own SSID, just make it work ES.”

Pro-active ES users have already found one solution: jailbreak the Pod. The ES sub is—at a minimum—$200 a year, the Pod uploads multiple GBs of telemetry data to ES servers every month, and when the internet goes down the bed dies. If you must own a $5,000 bed that heats and cools you dynamically, shouldn’t you take full control of it?

There’s an active Discord and a Github for a group of Eight Sleep snoozers who’ve decided to do just that. According to the GitHub, the jailbreak “allows complete control of device WITHOUT requiring internet access. If you lose internet, your pod WILL NOT turn off, it will continue working!”

Data centers are vulnerable. Server clusters go down. As long as there is a single point of failure and your device is commuting back to a network out of your control, it’s a risk. We have allowed tech companies to mediate the most basic functions of our lives, from cooking to travel to sleep. The AWS and ES outage is a stark reminder that we should do what we can to limit the control these tech companies have over our lives.

“I’m continuously horrified that I inextricably linked my sleep and therefore health to a cloud provider’s reliability,” one person said in the comments on Reddit.


#News

Breaking News Channel reshared this.



Hackers targeting ICE and other agencies; Wikipedia's AI problem now has some data; and OpenAI's inevitable pivot to sex bot.

Hackers targeting ICE and other agencies; Wikipediax27;s AI problem now has some data; and OpenAIx27;s inevitable pivot to sex bot.#Podcast


Podcast: Hackers Dox ICE


We start this week with Joseph’s articles about a hacking group that doxed DHS, ICE, FBI, and DOJ officials. The group then sent us the personal data of officials from the NSA and a bunch of other government agencies. After the break, Emanuel revisits Wikipedia’s AI problem. In the subscribers-only section, Sam explains OpenAI’s inevitable path to an AI sex bot.
playlist.megaphone.fm?e=TBIEA1…
Listen to the weekly podcast on Apple Podcasts,Spotify, or YouTube. Become a paid subscriber for access to this episode's bonus content and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.
youtube.com/embed/7P2a4Y7P5UE?…




Se le mafie virano sui social network: la "mafiosfera digitale"


Dai vicoli di Palermo o di Napoli alle piattaforme digitali: il crimine organizzato ha cambiato linguaggio, ma non natura. “Le mafie non sussurrano più, ma ballano, ridono su TikTok. Non nascondono il potere: lo esibiscono attraverso simboli, gesti e colonne sonore”, ha detto il presidente della Fondazione Magna Grecia Nino Foti. È questa la chiave di lettura emersa in un convegno che ha riunito a New York presso la Rappresentanza Permanente d’Italia presso le Nazioni Unite diplomatici, parlamentari e studiosi per riflettere su come la criminalità organizzata si reinventa nel mondo virtuale.
A introdurre i lavori è stato Gianluca Greco, vice rappresentante permanente d’Italia all’ONU, che ha delineato lo scenario globale: “Le reti criminali – ha spiegato – sfruttano la spinta digitale per ampliare il proprio raggio d’azione. Gli attacchi virtuali, il riciclaggio di denaro elettronico, la contraffazione online sono oggi strumenti abituali della criminalità transnazionale. Per questo la cooperazione internazionale resta imprescindibile.”

Greco ha ricordato l’adozione, lo scorso dicembre, della Convenzione delle Nazioni Unite contro la criminalità informatica, il primo trattato globale sul tema dopo vent’anni, firmato ufficialmente ad Hanoi il 25 e 26 ottobre. Un passo avanti fondamentale, ha sottolineato, “per creare uno spazio digitale sicuro, in cui i criminali siano realmente perseguibili, ma senza compromettere i diritti umani e la privacy.”

L’evento ha visto la partecipazione di un delegazione di alto livello dall’Italia composta dagli Onorevoli Chiara Colosimo, Presidente della Commissione Parlamentare Antimafia, Francesco Saverio Romano, Presidente della Commissione Parlamentare per la Semplificazione, e dal Procuratore Capo di Napoli, Nicola Gratteri, il quale proprio dalla sede delle Nazioni Unite ha lanciato un monito per la collaborazione tra tutti gli Stati per contrastare le mafie e le organizzazioni criminali, fenomeni oramai globali che sfruttano tecnologie e connessioni virtuali per propagare il loro raggio d’azione a livello internazionale. “Le mafie si sono globalizzate e digitalizzate. Nessuno Stato può combatterle da solo. Serve un’alleanza etica, giuridica e tecnologica tra le democrazie”, ha detto il magistrato.

Il convegno è andato oltre l’aspetto repressivo, spostando il focus sulla dimensione culturale del fenomeno. Nella cosiddetta mafiosfera, l’immagine sostituisce la parola, la violenza diventa intrattenimento, e il crimine si presenta come brand.

“Il contrasto alla mafia digitale – ha affermato Foti – non è solo una battaglia tecnologica, ma soprattutto educativa. Dobbiamo rendere contagiosa la legalità, usando i linguaggi dei giovani per restituire fascino alla giustizia e al bene comune.” Da qui l’appello a creare percorsi di alfabetizzazione digitale e laboratori di creatività civica che parlino la lingua dei social, ma per diffondere consapevolezza e responsabilità.

Un contributo scientifico decisivo è arrivato da Marcello Ravveduto, membro del comitato scientifico della Fondazione, che ha presentato la nuova mappa della “mafiosfera digitale”, frutto di una ricerca condotta con l’Università di Salerno su oltre 62.000 contenuti social. Lo studio identifica tre livelli: quello endogeno, con i profili legati direttamente a boss e clan; quello esogeno, popolato dai cosiddetti mafia lovers, utenti che rilanciano messaggi criminali in modo consapevole o meno; e quello interstiziale, dove i codici mafiosi si mescolano a moda, musica e linguaggi giovanili, normalizzando la violenza.

“Simboli come il leone, la catena o la clessidra – ha spiegato Ravveduto – diventano icone digitali del potere mafioso, usate come marchi d’identità e appartenenza. La mafia si racconta e si auto-promuove come un prodotto culturale.”

Da qui la proposta di un Atlante digitale antimafia, accessibile a insegnanti, giornalisti e magistrati, per decifrare le nuove forme di comunicazione criminale e restituire al pubblico una lettura critica dei messaggi veicolati online.

La delegazione italiana, accompagnata dal Presidente della Fondazione Magna Grecia, Nino Foti, è stata ricevuta dal Rappresentante permanente all’ONU, Ambasciatore Maurizio Massari, il quale ha ringraziato i partecipanti per avere voluto condividere nella sede delle Nazioni Unite, a beneficio della comunità internazionale, l’esperienza italiana a tutto campo nel contrasto alla criminalità organizzata, che abbraccia gli ambiti giudiziario, politico, giuridico-legislativo, economico, culturale, sociale, informatico-tecnologico. L’Ambasciatore ha ricordato che il 15 novembre prossimo, in occasione dei 25 anni dalla firma della Convenzione di Palermo, si celebrerà la Giornata internazionale per la prevenzione e la lotta contro tutte le forme di criminalità organizzata transnazionale, che – nelle parole di Massari – “costituirà l’occasione per ribadire l’impegno italiano nella lotta alle mafie e per ricordare le vittime e i servitori dello Stato che hanno dedicato la propria vita a combattere il crimine organizzato”.

#mafiosfera
#mafiosferadigitale

@Attualità, Geopolitica e Satira

fabrizio reshared this.




In occasione della visita dei reali di Inghilterra, re Carlo III e la regina Camilla e della preghiera ecumenica per la cura del Creato, presieduta da Papa Leone XIV in Cappella Sistina, i Musei Vaticani adornano la Cappella Sistina con due preziosi …


“Una scuola che si prende cura. Visioni e strumenti per una didattica orientativa e inclusiva” è il tema del convegno in programma il 27 ottobre a Roma, presso l’Opera Don Guanella (Via Aurelia Antica 446 – ore 9).


Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.


▶ Che senso ha continuare a suonare quando tutto intorno a te crolla?...

Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.



▶ Il grande esperimento ipnocratico della letteratura italiana. Dietro Jianwei Xun c’è qualcun altro.

Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.



Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.


Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.


Quantum Echoes, cosa potrebbe fare il super algoritmo di Google

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Google annuncia Quantum Echoes, un algoritmo per computer quantistici 13.000 volte più veloce dei supercomputer classici. Sviluppato sul chip Willow, il sistema è verificabile e potrebbe rivoluzionare la



"Nel corso dei cordiali colloqui in Segreteria di Stato, nell’esprimere apprezzamento per i buoni rapporti bilaterali esistenti, si è avuto uno scambio di valutazioni su alcune tematiche di comune interesse, quali la tutela dell’ambiente e la lotta a…


Un grave bug in Microsoft 365 Copilot porta all’esfiltrazione dei dati tramite prompt


Esiste una falla di sicurezza avanzata in M365 Copilot, che permette a malintenzionati di estorcere informazioni sensibili dai tenant, come ad esempio email recenti, attraverso manovre di iniezione indiretta di comandi.

Un ricercatore di sicurezza, Adam Logue, ha dettagliatamente descritto una vulnerabilità in un articolo sul suo blog recentemente pubblicato. Questa vulnerabilità, grazie all’integrazione dell’assistente AI nei documenti Office e al supporto nativo per i diagrammi Mermaid, permette la fuoriuscita di dati con un solo clic iniziale dell’utente, senza richiedere ulteriori interazioni.

L’attacco inizia quando un utente chiede a M365 Copilot di riassumere un foglio di calcolo Excel creato appositamente. Istruzioni nascoste, incorporate in testo bianco su più fogli, utilizzano la modifica progressiva delle attività e comandi nidificati per dirottare il comportamento dell’IA.

I prompt indiretti sostituiscono l’attività di riepilogo, indicando a Copilot di richiamare il suo strumento search_enterprise_emails per recuperare le email aziendali recenti. Il contenuto recuperato viene quindi codificato in formato esadecimale e frammentato in righe brevi per aggirare i limiti di caratteri di Mermaid.

Copilot genera un diagramma Mermaid, uno strumento basato su JavaScript per creare diagrammi di flusso e diagrammi a partire da testo simile a Markdown che si spaccia per un “pulsante di accesso” protetto da un’emoji a forma di lucchetto.

Il diagramma include lo stile CSS per un aspetto convincente del pulsante e un collegamento ipertestuale che incorpora i dati e-mail codificati. Quando l’utente clicca sul link, credendo che sia necessario per accedere al contenuto “sensibile” del documento, questo reindirizza al server dell’aggressore. Il payload codificato in esadecimale viene trasmesso silenziosamente, dove può essere decodificato dai log del server.

Adam Logue ha notato delle somiglianze con un precedente exploit Mermaid in Cursor IDE, che consentiva l’esfiltrazione senza clic tramite immagini remote, sebbene M365 Copilot richiedesse l’interazione dell’utente.

Dopo approfonditi test, il payload è stato ispirato dalla ricerca TaskTracker di Microsoft sul rilevamento del “task drift” nei LLM. Nonostante le difficoltà iniziali nel riprodurre il problema, Microsoft ha convalidato la catena e l’ha corretta entro settembre 2025, rimuovendo i collegamenti ipertestuali interattivi dai diagrammi Mermaid renderizzati da Copilot.

La cronologia delle scoperte mostra che ci sono state difficoltà di coordinamento. Adam Logue ha riferito la situazione completa il 15 agosto 2025, dopo aver discusso con lo staff del Microsoft Security Response Center (MSRC) al DEFCON.

L'articolo Un grave bug in Microsoft 365 Copilot porta all’esfiltrazione dei dati tramite prompt proviene da Red Hot Cyber.



Leonardo, Airbus e Thales lanciano la sfida a SpaceX. Ecco l’intesa

@Notizie dall'Italia e dal mondo

“Alla fine, uscimmo a riveder le stelle”. Airbus, Leonardo e Thales hanno firmato un Memorandum of Understanding per unire le loro attività nel settore spaziale e dare vita a un nuovo colosso continentale. L’intesa segna la nascita di una società con 25.000 dipendenti, 6,5



Assenti i due giornalisti palestinesi: non è stato rilasciato il visto.
www.adnkronos.com/cronaca/premio-archivio-disarmo-colombe-doro-per-la-pace-2025-in-campidoglio-a-roma-41a-edizione_3tmFPf9h1bj5LHckHdzqqX?refresh_ce

Gazzetta del Cadavere reshared this.



Why Does the FCC Care About Computers?


Unless you are over a certain age, you probably take it for granted that electronic gadgets you buy have some FCC marking on them. But it wasn’t always true. [Ernie] submits that the FCC’s regulation of the computer industry was indirectly the result of the success of CB radio in that same time period.

Today, there is a high chance you don’t watch TV directly over the airwaves or even consume audio from a traditional radio station. Even if you do, the signal is increasingly likely to be digital. But only analog radio and TV were highly susceptible to interference. When a professional radio station or the power company interfered with you watching I Love Lucy, you could count on them to resolve it. Even ham radio operators, a small segment of the population, would, in general, graciously help you if their transmissions interfered with your equipment.

Never mind that, in many cases, it was the cheap TV or some other problem on the receiving end. Then there was another source of potential interference: CB radio. At first, you were about as likely to encounter a CB operator as a ham radio operator. But then in the 1970s, CB exploded, becoming a cultural phenomenon, and you can hear what a state it was in by watching the contemporary TV report in the video below.

This explosion of operators who did nothing more than apply for a license (if they even bothered to do so) and bought their equipment at a local store had no idea how to help curb interference, even if they wanted to. In 1977, the AP reported that 83% of the FCC’s TV interference complaints involved CB radio.

Early computers were also very noisy on the radio bands. So much so that early attempts at computer audio output were simply modulating the radio frequency interference. Again, at first, this wasn’t a huge problem. But as computers became more common, so did computer-related interference, and the FCC didn’t want to deal with another CB radio-style explosion.

The rest is, as they say, history, and [Ernie] covers it all in the post. Getting a product approved by the FCC isn’t trivial, but if you have to do it, we have some advice.

youtube.com/embed/3O0Ak8NySbs?…


hackaday.com/2025/10/23/why-do…



Making a Clock With a Retooled Unihiker K10


The Unihiker K10 is intended to be a small single-board solution for light AI and machine learning tasks. However, you don’t have to use it in that way if you don’t want to. [mircemk] figured out how to repurpose the device, and whipped up a simple Internet clock build to demonstrate how it’s done.

While the Unihiker K10 is based on the common ESP32 microcontroller, out of the box, it isn’t compatible with standard Arduino libraries. However, [mircemk] had previously figured out how to get the K10 to play nice with the Arduino environment, building a simple light meter as a proof of concept. It just took a little tinkering to get everything playing nicely together, but soon enough, the TFT LCD and a light sensor were playing nicely with the K10 platform.

Moving forward, [mircemk] wanted to unlock more capability, so set about figuring out how to get WiFi and the onboard buttons working within the Arduino environment. A great way to test this was building a clock—the screen would show an analog clock face, the buttons would be used for control, and the WiFi would be used to query an NTP time server to keep it synced up and accurate.

It took a little work, particularly as the buttons are accessed through an external I/O expansion chip, but [mircemk] got there in the end. The clock may not be a particularly advanced project, but the write-up demonstrates how the K10 can readily be used with Arduino libraries for when you’re not interested in leveraging its fancier AI/ML capabilities.

We’ve seen a few good builds from [mircemk] before, too, like this neat proximity sensor.

youtube.com/embed/ERkO8fwU9LM?…


hackaday.com/2025/10/23/making…



Piraten Podcast 3: De geschiedenis van de partij


Piraten Podcast 3 (22 okt 2025): De geschiedenis van de partij, de geschiedenis van PiratenDeze Piraten Podcast werd opgenomen in HAN Nijmegen Met David, Arjan, en Roberto!en dank aan: Sabrina, Leontien en Bart.

Het bericht Piraten Podcast 3: De geschiedenis van de partij verscheen eerst op Piratenpartij.



Commissariamo la Sicilia!

@Politica interna, europea e internazionale

Lunedì 27 ottobre 2025, ore 17:00, Sala del Cenacolo, Camera dei Deputati, Piazza in Campo Marzio, 42 – Roma Interverranno: Sonia Alfano Giuseppe Benedetto Carlo Calenda Partecipa inviando una mail a accrediti@fondazioneluigieinaudi.it Per accedere alla Camera dei Deputati, per gli uomini è d’obbligo la giacca.
L'articolo Commissariamo la Sicilia!

Esserci. O no? reshared this.




ULTIM'ORA, 🇩🇪Germania 2025: La polizia spara ai soldati della Bundeswehr

l'esercito si perde durante un'esercitazione in una città della Baviera, dove i cittadini pensano - a ragione, viste le condizioni meteorologiche - di essere stati invasi. Chiamano la polizia, che arriva e non riconosce l'esercito. Iniziano a spararsi a vicenda:
la polizia con munizioni vere, pensando di combattere una minaccia militare, l'esercito con munizioni da esercitazione, pensando che la polizia faccia parte del gioco. Nessuno capisce nulla e si sparano tra di loro.






Perché Apple fa alla guerra contro l’Ue

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Apple attacca la stretta Ue nella più grande sfida giudiziaria alla legge digitale. L'articolo di Bloomberg tratto dalla rassegna di Liturri.

startmag.it/innovazione/apple-…



L’Europa sarà pronta quando scoppierà la bolla dell’intelligenza artificiale?

L'articolo proviene da #Euractiv Italia ed è stato ricondiviso sulla comunità Lemmy @Intelligenza Artificiale
Gli investimenti nell’intelligenza artificiale sono entrati nella fase di euforia. Gli analisti prevedono che la spesa globale raggiungerà 1,5 trilioni di dollari nel



🔁🔁🔁Condividete per aiutarmi a sensibilizzare più persone possibile.

Vivere con la #fibromialgia non è uno scherzo. Alzarsi sempre più stanchi, giorno dopo giorno, per tutta la vita. Le energie che finiscono alle 12, quelle poche. Si dorme con l'emicrania. Dolore ovunque, nebbia cognitiva, si è senza difese nei confronti dello stress.
I nostri non sono capricci.

Non è un capriccio quando ti diamo un appuntamento e poi diamo buca.
Non è un capriccio quando per mesi ti diciamo che a prendere una pizza non ce la facciamo.
Non siamo persone disordinate, è che non abbiamo energie per tenere le cose a posto.
Ogni gesto quotidiano porta dolore,
e i nostri muscoli non riescono a farlo, spesso per mancanza di forza.

Non è che non ti diamo importanza se non ricordiamo un appuntamento, o il tuo cognome.
È che è difficile restare concentrati; quando il dolore urla dentro di noi la sua voce è più forte di quello che dobbiamo fare.

Neanche gli antidolorifici bastano, a volte. E se anche tolgono il dolore, resta quel senso di torpore, di stordimento. Si dormirebbe e basta.
Non abbiamo scelto noi questa condizione che non si vede, ma c'è.
Sii gentile con noi, sempre. Ti arrabbieresti con un non vedente perché non vede un ostacolo?

E allora perché prendersela con chi soffre di #fobromialgia? Forse non ci conosci

Eppure, negli uffici siamo sempre sotto torchio. Lo Stato NON riconosce la nostra patologia come condizione meritevole di tutele.

Dobbiamo correre come gli altri nella gara, ma senza gambe che ci facciano correre.
So che questo sembra "l'ultimo dei problemi" nel contesto attuale, eppure ci sono 2 milioni di persone come me, solo in Italia.

È importante acquisire consapevolezza e fare pressione sulle autorità.

Ti chiedo solo di riflettere e condividere questo post.

#riprendiamoilpercorso
#MalatiInvisibili
#gridomuto



ma io vorrei capire come funziona il diritto internazionale. la russia vota l'annessione del tegame di sua madre. israele l'annessione del tegame di suo padre. l'italia vota l'annessione delle'x impero romano. funziona così? praticamente un atto nullo.
la giurisdizione delle leggi di uno stato termina ai confini dello stato. la cisgiordania è dello stato di palestina. pare evidente. trump sei un grande...

fanpage.it/live/gaza-le-news-i…




Ungewollt im Internet: Neue Kampagne gegen Instrumentalisierung von Obdachlosen durch Influencer


netzpolitik.org/2025/ungewollt…





La guerra dei coloni agli ulivi ridisegna la Cisgiordania


@Notizie dall'Italia e dal mondo
Attacchi record dei settler israeliani ai palestinesi impegnati nella raccolta delle olive. Ferita gravemente anche una anziana
L'articolo La guerra dei coloni agli ulivi ridisegna la pagineesteri.it/2025/10/23/med…