Salta al contenuto principale



“Vogliamo dimostrare come l’attività fisica possa diventare non solo uno strumento terapeutico innovativo e accessibile, ma anche un’opportunità di migliorare concretamente la qualità di vita delle persone con Parkinson”.



Il 13 novembre ricorrono i 100 anni dalla morte della beata suor Maria Carola Cecchin (1877-1925), missionaria cottolenghina beatificata il 5 novembre 2022 a Meru, in Kenya, dove operò per vent’anni; morì sul piroscafo che la stava riportando in Ital…



I've just received my Bark Sweden wooden case, it's the second one, as I got one for my FP5 too. This time I bought the Masur birch, with reinforced corners.

It's absolutely beautiful!

It's a real piece of art and it fits like a glove on my FP6.

It's about 1 mm over the glass screen so the screen should be well protected. The grip is more secure than with the original Fairphone cover (which is also good).

It's not cheap, but I think it's really worth the money.

If you're thinking about a Christmas gift for yourself think of this case. 😁

I'll leave some pics.

barksweden.com/en/fairphone

(More pics in the comment).

#Fairphone #BarkSweden

in reply to DoomsdaysCW

@DoomsdaysCW you tagged FP5, it's a FP6 cover (but Bark Sweden also makes covers for other FP models).


AzureHound: lo strumento “legittimo” per gli assalti al cloud


AzureHound, parte della suite BloodHound, nasce come strumento open-source per aiutare i team di sicurezza e i red team a individuare vulnerabilità e percorsi di escalation negli ambienti Microsoft Azure ed Entra ID.

Oggi, però, è sempre più spesso utilizzato da gruppi criminali e attori sponsorizzati da stati per scopi ben diversi: mappare infrastrutture cloud, identificare ruoli privilegiati e pianificare attacchi mirati.

Perché AzureHound è diventato uno strumento pericoloso


Scritto in Go e disponibile per Windows, Linux e macOS, AzureHound interroga le API di Microsoft Graph e Azure REST per raccogliere informazioni su identità, ruoli, applicazioni e risorse presenti nel tenant.

Il suo funzionamento, progettato per scopi legittimi, si rivela utile anche a chi vuole colpire:

  1. Può essere eseguito da remoto, senza accedere direttamente alla rete vittima.
  2. Produce output JSON compatibili con BloodHound, che li traduce in grafici di relazioni, privilegi e potenziali percorsi di attacco.

In altre parole, AzureHound consente di automatizzare quella fase di ricognizione che, in passato, richiedeva tempo e competenze manuali, trasformando il cloud reconnaissance in un processo rapido e preciso.
Execution of AzureHound to enumerate users BloodHound illustration of available key vaults.

Dall’uso legittimo all’abuso


Nel corso del 2025 diversi gruppi di cybercriminali hanno adottato AzureHound per scopi offensivi.
Secondo analisi di threat intelligence, Curious Serpens (noto anche come Peach Sandstorm), Void Blizzard e il gruppo Storm-0501 hanno impiegato lo strumento per enumerare ambienti Entra ID, individuare configurazioni errate e pianificare escalation di privilegi.
Ciò dimostra come strumenti nati per la sicurezza possano diventare parte integrante delle campagne di compromissione, soprattutto quando gli ambienti cloud non sono monitorati in modo adeguato.

Come viene sfruttato


Dopo aver ottenuto un primo accesso a un tenant Azure tramite credenziali compromesse, phishing o account di servizio vulnerabili, gli operatori malevoli eseguono AzureHound per:

  • raccogliere informazioni su utenti, ruoli e relazioni;
  • individuare identità privilegiate o service principal con permessi eccessivi;
  • scoprire percorsi indiretti di escalation di privilegi;
  • costruire, tramite BloodHound, una rappresentazione grafica dell’intero ambiente.

Questa visibilità permette di pianificare con precisione i passi successivi: dall’escalation al movimento laterale, fino all’esfiltrazione dei dati o alla distribuzione di ransomware.

Cosa fare per difendersi


Le organizzazioni che utilizzano Azure e Microsoft Entra ID dovrebbero implementare controlli mirati per individuare e bloccare comportamenti anomali legati all’uso improprio di strumenti come AzureHound.

Monitorare le API per individuare pattern di enumerazione insoliti verso Graph e REST API.
Creare alert su query massicce o su richieste con user-agent sospetti.
Limitare i permessi delle applicazioni e delle service principal, adottando il principio del privilegio minimo.
Applicare MFA e controlli stringenti sugli account sincronizzati con privilegi elevati.
Integrare regole di hunting nei SIEM (come Microsoft Sentinel o Defender XDR) per rilevare comportamenti riconducibili alla raccolta automatica di dati.

Conclusione


AzureHound rappresenta un esempio concreto di come strumenti nati per migliorare la sicurezza possano diventare un’arma nelle mani sbagliate.
Capire come questi strumenti vengono abusati è fondamentale per costruire strategie di difesa efficaci, potenziare la visibilità sugli ambienti cloud e ridurre il tempo di reazione in caso di compromissione.
Solo conoscendo le stesse tecniche impiegate da chi attacca è possibile anticiparle e mantenere il controllo delle proprie infrastrutture digitali.

L'articolo AzureHound: lo strumento “legittimo” per gli assalti al cloud proviene da Red Hot Cyber.



Il Papa ha ricevuto oggi in udienza il presidente della Repubblica di Croazia, Zoran Milanović, il quale ha successivamente incontrato il cardinale Segretario di Stato, Pietro Parolin, accompagnato da mons.



Neue irische Datenschutzbeauftragte: Menschenrechtsorganisation reicht Beschwerde bei EU-Kommission ein


netzpolitik.org/2025/neue-iris…




Pirate Meetup @ Boston Anarchist Bookfair, This Weekend


Join us at a Pirate Meetup at the Boston Anarchist Book Fair this weekend at the Cambridge Community Center. We will start at noon on both days!

We will meet at the 5 Callender Street entrance to the Cambridge Community Center. As part of the meetup, we will divide up the area around the Community Center and go searching for Ring and other cameras to add to our Surveillance Camera Map. We mapped some of the cameras in the area and expect there will be more.

Tell us if you can make it.

Before you come, consult our Mapping Surveillance page with instructions on how create an Open Street Map account and setup a client on your phone.


masspirates.org/blog/2025/10/3…




AMNESTY: Il sistema europeo Schengen discrimina chi difende i diritti umani


@Notizie dall'Italia e dal mondo
L'emissione di visti ostacola le persone che difendono i diritti umani di varie parti del mondo, impedendo a molte di loro di partecipare a importanti conferenze
L'articolo AMNESTY: Il sistema europeo Schengen discrimina chi difende i diritti umani proviene da



Prenotazioni eureka

"Eureka" è un progetto pensato per avvicinare le ragazze e i ragazzi dell'ultimo anno della scuola media al liceo classico. L'obiettivo è far vivere loro l'esperienza di una lezione-tipo, al posto dei classici corsi di alfabetizzazione.

Chiunque voglia sperimentare l'esperienza liceale e conoscere meglio l'offerta del liceo classico Augusto, può iscriversi a uno dei 6 incontri disponibili, scegliendo la data e seguendo le istruzioni per la prenotazione.

Nelle stesse date, dalle 16 alle 17, è previsto anche uno sportello dedicato esclusivamente alle famiglie, per rispondere alle loro domande e chiarire eventuali dubbi. Anche le famiglie dei ragazzi che non partecipano alle lezioni sono invitate a utilizzare questo servizio.

Clicca sul link per prenotare la data che preferisci

forms.gle/6pxwjdhdLqsEfcqQA

(allegato)

liceoaugustoroma.edu.it/catego…



se non altro con trump sappiamo che gli usa attaccano il venezuela non con l'intenzione di esportare la democrazia... ma per motivi personali di re trump.

reshared this



Referendum e invasioni di campo


@Giornalismo e disordine informativo
articolo21.org/2025/10/referen…
La migliore spinta per la campagna elettorale del “NO” alla “deforma” (copyright del compianto Felice Besostri) è arrivata dalla replica della signora presidente del Consiglio verso la sentenza della Corte dei Conti riguardante il ponte sullo stretto di Messina. Replica che è



E la chiamano “riforma”, non vendetta


@Giornalismo e disordine informativo
articolo21.org/2025/10/e-la-ch…
Siamo molto oltre Gelli e la P2, che avendo ancora il fastidio dei comunisti e dell’Unione Sovietica, dovevano pur procedere con qualche cautela
L'articolo E la chiamano “riforma”, non vendetta proviene da Articolo21.




Sangiuliano mostra a Formigli il braccialetto con scritto “siete dei poveri comunisti” | VIDEO


@Politica interna, europea e internazionale
L’ex ministro Gennaro Sangiuliano, ora candidato di Fratelli d’Italia alle regionali in Campania, ha fatto parlare di sé per aver mostrato durante il programma Piazzapulita un braccialetto con la scritta “Siete dei poveri comunisti”. Il conduttore



Learn What a Gaussian Splat Is, Then Make One


Gaussian Splats is a term you have likely come across, probably in relation to 3D scenery. But what are they, exactly? This blog post explains precisely that in no time at all, complete with great interactive examples and highlights of their strengths and relative weaknesses.
Gaussian splats excel at making colorful, organic subject matter look great.
Gaussian splats are a lot like point clouds, except the points are each differently-shaped “splats” of color, arranged in such a way that the resulting 3D scene looks fantastic — photorealistic, even — from any angle.

All of the real work is in the initial setup of the splats into the scene. Once that work is done, viewing is the easy part. Not only are the resulting file sizes of the scenes small, but rendering is computationally simple.

There are a few pros and cons to gaussian splats compared to 3D meshes, but in general they look stunning for any kind of colorful, organic scene. So how does one go about making or using them?

That’s where the second half of the post comes in handy. It turns out that making your own gaussian splats is simply a matter of combining high-quality photos with the right software. In that sense, it has a lot in common with photogrammetry.

Even early on, gaussian splats were notable for their high realism. And since this space has more than its share of lateral-thinkers, the novel concept of splats being neither pixels nor voxels has led some enterprising folks to try to apply the concept to 3D printing.


hackaday.com/2025/10/31/learn-…



Red Hot Cyber lancia il servizio gratuito “CVE Enrichment” in tempo reale


La tempestività è fondamentale nella cybersecurity.

Red Hot Cyber ha recentemente lanciato un servizio completamente gratuito che permette a professionisti IT, analisti della sicurezza e appassionati di tenere sotto controllo le vulnerabilità più critiche pubblicate sul National Vulnerability Database (NVD) degli Stati Uniti.

CVE critiche emesse negli ultimi 3 giorni


Il servizio consente di visualizzare le ultime CVE (Common Vulnerabilities and Exposures) critiche emesse negli ultimi tre giorni, con la possibilità di filtrare le informazioni in base allo score di gravità e visualizzare i bug emessi dai vendor più noti. In questo modo, le organizzazioni possono subito identificare le minacce più rilevanti per i propri sistemi e applicazioni.

Ma il vero valore aggiunto del servizio di Red Hot Cyber risiede nell’arricchimento delle informazioni e nella sua integrazione in un unico advisor.

Secondo gli esperti di Red Hot Cyber, questa piattaforma non solo aiuta a monitorare le vulnerabilità in tempo reale, ma costituisce anche un strumento educativo per comprendere l’impatto e la probabilità di sfruttamento delle minacce emergenti.

Arricchimento dei dati per singola CVE


Per ogni CVE, gli utenti possono accedere a una pagina dedicata che raccoglie e consolida dati provenienti da diverse fonti autorevoli:

  • NIST (National Institute of Standards and Technology): il database ufficiale delle vulnerabilità negli Stati Uniti.
  • FIRST (Forum of Incident Response and Security Teams): organizzazione globale che coordina la risposta agli incidenti di sicurezza.
  • EPSS (Exploit Prediction Scoring System) e EPSS Percentile: metriche che stimano la probabilità di sfruttamento della vulnerabilità.
  • CISA KEV (Cybersecurity and Infrastructure Security Agency Known Exploited Vulnerabilities): elenco delle vulnerabilità già sfruttate attivamente.

Oltre a questi dati, la piattaforma integra gli articoli di approfondimento di Red Hot Cyber e gli exploit disponibili su GitHub, permettendo così di avere una visione completa dello stato della vulnerabilità e delle possibili minacce.

Per chi desidera analizzare una CVE specifica, il servizio offre una funzione di ricerca dedicata: basta inserire l’identificativo della CVE per accedere immediatamente a tutte le informazioni e agli exploit correlati.

Con questa iniziativa, Red Hot Cyber conferma la sua missione di rendere la sicurezza informatica più accessibile, offrendo strumenti avanzati ma semplici da usare, senza alcun costo per gli utenti.

Il servizio è già disponibile sul sito ufficiale di Red Hot Cyber, pronto a diventare uno strumento indispensabile per chiunque voglia rimanere un passo avanti rispetto alle minacce informatiche.

L'articolo Red Hot Cyber lancia il servizio gratuito “CVE Enrichment” in tempo reale proviene da Red Hot Cyber.




@Roberto Burioni lascia Facebook, nonostante le decine di migliaia di follower.

E loro lo seguono...

Questo dimostra che c'è la possibilità di avere contatti social con migliaia di persone anche senza dover sottostare per forza alle forche caudine di Meta e senza dover scendere a compromessi avvilenti con la propria morale.

Speriamo non sia il primo e speriamo che qualcuno di loro si accorga anche del Fediverso, perché pur con tutto l'apprezzamento per certe prese di posizione resto convinto del fatto che se lasci un social commerciale per andare su un altro social commerciale forse stai un po' girando in tondo.




"La direttiva dell'Unione europea 2014/24, valida in tutti i paesi membri, stabilisce che se i costi di un'opera pubblica aumentano di oltre il 50% rispetto al contratto iniziale, bisogna indire una nuova gara d'appalto aperta a tutte le imprese europee. Nel caso del Ponte, il contratto originale del 2006 prevedeva circa 4,6 miliardi di euro, mentre oggi la stima dei costi arriva a 13,5 miliardi, quasi tre volte tanto. Ciò significa che, secondo la normativa europea, il governo avrebbe dovuto avviare una nuova gara internazionale, invece di riattivare semplicemente il vecchio contratto con Eurolink, il consorzio incaricato della costruzione."

direi che l'obiezione della corte è sensibile e NON politica. il rispetto delle regole degli appalti è importante. come non pulirsi il culo dei regolamenti europei che ci siamo impegnati a rispettare.

in sostanza la corte ha bocciato l'opera solo perché è stata finanziata con i soliti metodi mafiosi all'italiana. e non è un nodo politico.

la corte dei conti, che fa un vaglio tecnico finanziario e non politico, ha solo dimostrato di essere un'istituzione più seria e rispettosa delle regole del governo.



L’ombra cinese non raffredda i conti di Apple

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Trimestre oltre le attese per il gigante tech di Cupertino, con fatturato e utili in aumento. Boom dei servizi, che compensa il calo vendite in Cina. Il ceo Cook startmag.it/innovazione/lombra…



Dalla nona conferenza globale sulle finanze criminali e le criptovalute emerge la necessità di standard e cooperazione più forti


Un momento della Conferenza

I partecipanti all'evento di Vienna – organizzato congiuntamente da #Europol, #UNODC e dall'Istituto di governance di Basilea (#BaselInstituteonGovernance) – hanno acquisito nuove informazioni sui modi in evoluzione in cui le #criptovalute e la tecnologia #blockchain vengono utilizzate dalla criminalità. La conferenza del 28 e 29 ottobre 2025 ha riunito più di 250 partecipanti presenti (e più di 1 000 online) provenienti da un'ampia gamma di settori, tra cui forze dell'ordine, pubblici ministeri, regolatori, ricercatori e importanti società di intelligence blockchain.

La crescente sofisticazione delle tattiche criminali comporta rischi, non solo per il settore delle criptovalute e per le vittime della truffa, ma per la società in generale. Questi rischi includono crimini gravi come il traffico di droga, il finanziamento del terrorismo e l’evasione delle sanzioni.

Le forze dell'ordine, i partner del settore privato e il mondo accademico stanno rapidamente facendo progredire la loro capacità di contrastare le minacce poste dai sofisticati crimini legati alle criptovalute e dal riciclaggio di denaro. Gli strumenti avanzati stanno riducendo la dipendenza dal tracciamento manuale, mentre una serie di operazioni transfrontaliere di successo mostrano il potere della collaborazione.

Anche la ricerca e dati affidabili sull’uso delle criptovalute per scopi criminali sono fondamentali affinché i governi possano valutare i rischi e rispondere in modo appropriato.

La natura senza confini delle blockchain significa che i proventi criminali possono attraversare il globo in pochi secondi, mentre la cooperazione formale tra le autorità può richiedere ancora giorni o settimane. Canali interagenzia più rapidi sono vitali, hanno affermato i partecipanti, nonché un più stretto coordinamento tra investigatori e pubblici ministeri.

I partenariati pubblico-privato sono stati fondamentali per interrompere le attività illecite sulla blockchain, ma devono essere migliorati e ridimensionati. Questo è stato un tema chiave del primo giorno, dedicato alla collaborazione intersettoriale.

Anche un evento collaterale guidato dal Gruppo Wolfsberg ha sottolineato l'importanza della cooperazione tra privati.

Le criptovalute sono ora una caratteristica comune delle indagini sulla criminalità finanziaria, ma molte agenzie non hanno ancora le competenze e le risorse per perseguire piste o recuperare beni. Lo sviluppo di team specializzati e il miglioramento delle competenze degli ufficiali e funzionari in prima linea sono essenziali.

Con l’espansione e l’evoluzione dell’uso delle criptovalute, la Conferenza globale congiunta rimane una piattaforma unica per il dialogo e la cooperazione pratica.

Sviluppando standard chiari, rafforzando la cooperazione e sviluppando capacità, si possono garantire collettivamente le innovazioni finanziarie affinchè siano sfruttate per il bene pubblico prevenendone al tempo stesso gli abusi da parte dei criminali.

Scopri di più sulla conferenza e trova i collegamenti a eventuali registrazioni sul Pagina dell'evento della 9a Conferenza globale sulle finanze penali e le criptovalute a questo link baselgovernance.org/9crc

@Scienza e tecnologia

reshared this



fatico davvero a pensare che si possa in buona fede pensare che trump sia una soluzione ai problemi del mondo, o anche solo una soluzione ai problemi degli usa. o sei scemo o sei in cattiva fede. non ci sono altre possibilità. e tutti quelli che hanno "smesso" di parlarne bene sollo nell'ultimo anno non sono assolti. tale superficialità non può essere perdonata. e lo dice una che ammette di essersi sbagliata (ai tempi in cui era un comico) su grillo e su travaglio... molto prima che si vendessero ai russi. ma trump credo sia un'altra categoria: era davvero facile capire fin dall'inizio che fosse un bullo. l'uomo apparentemente "forte" (ma poi intimamente fragile, come tutti i bulli).


Bianca Bellová – L’uomo invisibile
freezonemagazine.com/articoli/…
Questa autrice della Repubblica Ceca ci ha abituati a romanzi profondi ed emozionanti, tra i quali Il lago, Mona, L’isola e con L’uomo invisibile conferma una volta di più le sue eccezionali doti narrative e scrittorie. Come accade in altri romanzi della Bellová, il luogo in cui si svolge la vicenda non è reale, o […]
L'articolo Bianca Bellová – L’uomo invisibile proviene da FREE ZONE


Linwood Barclay – Whistle. Trenini assassini
freezonemagazine.com/news/linw…
In libreria dal 7 Novembre 2025 Un thriller soprannaturale alla Stephen King, un romanzo che fa per i trenini giocattolo ciò che Chucky ha fatto per le bambole. Annie Blunt, illustratrice di libri per bambini, ha vissuto un anno devastante: la morte improvvisa del marito e una controversia legata a una delle sue opere […]
L'articolo Linwood Barclay – Whistle. Trenini


Hai il browser con l'ai? hai hai hai!


@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/ai-brows…
I nuovi browser con AI integrata escono delle fottute pareti. Perché? Beh, non certo per il nostro bene... diciamo che non è manna dal cielo. Clicca qui per contribuire al mio lavoro L'argomento è divisivo e polarizzante: c'è chi li ama e chi li odia.

Privacy Pride reshared this.



Musica, cosa cela la pace tra Universal Music e Udio sull’IA

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Universal Music Group e la startup Udio chiudono la disputa legale sul copyright e annunciano per il 2026 una piattaforma musicale basata su intelligenza artificiale addestrata su brani concessi in licenza dagli



Vulnerabilità in ChatGPT Atlas consente di manipolare la memoria dell’AI: come difendersi


@Informatica (Italy e non Italy 😁)
È stata scoperta una vulnerabilità nel browser agentico ChatGPT Atlas di OpenAI che, qualora venisse sfruttata, consentirebbe a un attaccante di iniettare istruzioni malevole nella memoria dell’IA ed eseguire codice remoto sul

reshared this



There’s Nothing Boring About Web Search on Retro Amigas


The most exciting search engine 68k can handle.

Do you have a classic Amiga computer? Do you want to search the web with iBrowse, but keep running into all that pesky modern HTML5 and HTTPS? In that case, [Nihirash] created BoringSearch.com just for you!

BoringSearch was explicitly inspired by [ActionRetro]’s FrogFind search portal, and works similarly in practice. From an end-user perspective, they’re quite similar: both serve as search engines and strip down the websites listed by the search to pure HTML so old browsers can handle it.
Boring search in its natural habitat, iBrowse on Amiga.
The biggest difference we can see betwixt the two is that FrogFind will link to images while BoringSearch either loads them inline or strips them out entirely, depending on the browser you test with and how the page was formatted to begin with. (Ironically, modern Firefox doesn’t get images from BoringSearch’s page simplifier.) BoringSearch also gives you the option of searching with DuckDuckGo or Google via the SerpAPI, though note that poor [Nihirash] is paying out-of-pocket for google searches.

BoringSearch is explicitly aimed at the iBrowse browser for late-stage Amigas, but should work equally well with any modern browser. Apparently this project only exists because FrogFind went down for a week, and without the distraction of retrocomptuer websurfing, [Nihirash] was able to bash out his own version from scratch in Rust. If you want to self-host or see how they did it, [Nihirash] put the code on GitHub under a donationware license.

If you’re scratching your head why on earth people are still going on about Amiga in 2025, here’s one take on it.


hackaday.com/2025/10/31/theres…



Parole condivise per esplorare il nostro patrimonio culturale


La Biblioteca nazionale centrale di Firenze e il Museo Galileo uniscono le forze in un progetto innovativo che unisce musei, archivi e biblioteche per viaggiare nel sapere in modo semplice e smart.

Vincitore del bando Digital MAB, promosso dalla Scuola nazionale del patrimonio e delle attività culturali, nell’ambito di Dicolab – Cultura al digitale, il progetto intende svolgere ricerche integrate tra patrimoni differenti (fotografie, stampe, manoscritti, oggetti). A partire dalla interoperabilità dei dati, l’obiettivo è la realizzazione di un modello di archivio iconografico di risorse di varia tipologia consultabile in modo trasversale con un’interfaccia di ricerca per l’accesso alla teca digitale del Museo Galileo tramite parole chiave controllate nel Thesaurus della Biblioteca nazionale centrale di Firenze per creare collegamenti con risorse di altre biblioteche, di archivi e di musei.

Scopri di più.

L'articolo Parole condivise per esplorare il nostro patrimonio culturale proviene da Biblioteca nazionale centrale di Firenze.



Half-good new Danish Chat Control proposal


Denmark, currently presiding over the EU Council, proposes a major change to the much-criticised EU chat control proposal to search all private chats for suspicious content, even at the cost of destroying secure end-to-end encryption: Instead of mandating the general monitoring of private chats (“detection orders”), the searches would remain voluntary for providers to implement or not, as is the status quo. The presidency circulated a discussion paper with EU country representatives today, aiming to gather countries’ views on the updated (softened) proposal. The previous Chat Control proposal had even lost the support of Denmark’s own government.

“The new approach is a triumph for the digital freedom movement and a major leap forward when it comes to saving our fundamental right to confidentiality of our digital correspondence”, comments Patrick Breyer (Pirate Party), a former Member of the European Parliament and digital freedom fighter. “It would protect secure encryption and thus keep our smartphones safe. However, three fundamental problems remain unsolved:

1) Mass surveillance: Even where voluntarily implemented by communications service providers such as currently Meta, Microsoft or Google, chat control is still totally untargeted and results in indiscriminate mass surveillance of all private messages on these services. According to the EU Commission, about 75% of the millions of private chats, photos and videos leaked every year by the industry’s unreliable chat control algorithms are not criminally relevant and place our intimate communication in unsafe hands where it doesn’t belong. A former judge of the European Court of Justice, Ninon Colneric (p. 34-35), and the European Data Protection Supervisor (par. 11) have warned that this indiscriminate monitoring violates fundamental rights even when implemented at providers’ discretion, and a lawsuit against the practice is already pending in Germany.

The European Parliament proposes a different approach: allowing for court orders mandating the targeted scanning of communications, limited to persons or groups connected to child sexual abuse. The Danish proposal lacks this targeting of suspects.

2) Digital house arrest: According to Article 6, users under 16 would no longer be able to install commonplace apps from app stores to “protect them from grooming”, including messenger apps such as WhatsApp, Snapchat, Telegram or Twitter, social media apps such as Instagram, TikTok or Facebook, games such as FIFA, Minecraft, GTA, Call of Duty, and Roblox, dating apps, video conferencing apps such as Zoom, Skype, and FaceTime. This minimum age would be easy to circumvent and would disempower as well as isolate teens instead of making them stronger.

3) Anonymous communications ban: According to Article 4 (3), users would no longer be able to set up anonymous e-mail or messenger accounts or chat anonymously as they would need to present an ID or their face, making them identifiable and risking data leaks. This would inhibit, for instance, sensitive chats related to sexuality, anonymous media communications with sources (e.g. whistleblowers), and political activity.

All things considered, the new Danish proposal represents major progress in terms of keeping us safe online, but it requires substantially more work. However, the proposal likely already goes too far already for the hardliner majority of EU governments and the EU Commission, whose positions are so extreme that they will rather let down victims altogether than accept a proportionate, court-proof and politically viable approach.”


patrick-breyer.de/en/half-good…



Andrew Cuomo Uses AI MPREG Schoolhouse Rock Bill to Attack Mamdani, Is Out of Ideas#AISlop


Andrew Cuomo Uses AI MPREG Schoolhouse Rock Bill to Attack Mamdani, Is Out of Ideas


I am haunted by a pregnant bill in Andrew Cuomo’s new AI-generated attack ad against Zohran Mamdani.

Cuomo posted the ad on his X account that riffed on the famous Schoolhouse Rock! song “I’m just a bill.” In Cuomo’s AI-generated cartoon nightmare, Zohran Mamdani lights money on fire while a phone bearing the ChatGPT logo explains, apparently, that Mamdani is not qualified.

The ad bears all the hallmarks of the sloppiest of AI trash: weird artifacting, strange voices that don’t sync with the mouths talking, and inconsistent animation. It feels both surreal and of the moment and completely ancient.

🎶“I’m Just A Shill” (FT. Zohran) pic.twitter.com/ga3JxnYO7B
— Andrew Cuomo (@andrewcuomo) October 30, 2025


And then there’s the pregnant bill.

The Schoolhouse Rock! Bill is an iconic cartoon character that has been parodied by everyone from The Simpsons to Saturday Night Live. There are thousands, perhaps millions, of pictures of the cartoon bill online, all available to be gobbled up by scrapers and turned into training data for AI.

For some reason, the bill in Cuomo’s ad has thick red lips (notably absent in the original) and appears to be pregnant. Adding to the discordant AI jank of the image, the pregnancy is only visible when the bill is standing up. Sometimes it’s leaning against the steps and in those shots it has the slim figure characteristic of its inspiration. But when the bill stands it looks positively inflated, almost as if the video generator used to make Cuomo’s ad was trained on MPREG fetish art of the bill and not the original cartoon itself. The thick and luscious red lips are present whether the bill is leaning or standing.

Towards the end of the ad, an anthropomorphic phone with a ChatGPT logo wanders into the scene. Standing next to the pregnant bill, I could not but help but think that the phone is the father of whatever child the bill carried.

My observation led to an argument in the 404 Media Slack channel and opinions were split. “It does not seem pregnant to me,” said Emanuel Maiberg.

Jason Koebler, however, came to my defense. He circled the pregnant belly of the cartoon bill and shared it. “Baby is stored in the circle area,” he said.

Perplexed by all this, I reached out to Cuomo’s campaign for an explanation. I wanted a response to the ad and to get his thoughts on AI-generated political content. More importantly, I needed to know their opinion on the pregnancy. “Does that bill look pregnant to you?” I asked. “I think it looks pregnant, but my editors are split. I would love for the Campaign to weigh in.” Out of journalist due diligence, I also reached out to Mamdani’s press office. Neither campaign has responded to my request for it to weigh in on the pregnancy of the AI-generated cartoon bill.

This is not the first time the Cuomo campaign has used AI. An ad in early October featured a deepfaked Cuomo working as a train operator, stock trader, and a stagehand. A week ago, the Cuomo campaign released a long, racist video depicting criminals endorsing Mamdani. Critics called the ad racist. The campaign deleted it shortly after it was posted and blamed the whole thing on a junior staffer.

It is worth noting that Cuomo's AI slop is being deployed most likely because the candidate has been utterly incapable of generating any authentic excitement about his campaign in New York City or on the internet, and he is facing a digitally native, younger candidate who just seems effortlessly Good At the Internet and Posting.

This is, unfortunately, how a lot of politics works in 2025. Desperate campaigns and desperate presidents are in a slop-fueled arms race to make the most ridiculous possible ads and social media content. It looks cheap, is cheap, and is the realm of politicians who are totally out of ideas, but increasingly it feels like slop is the dominant aesthetic of our time.




In a series of experiments, chimpanzees revised their beliefs based on new evidence, shedding light on the evolutionary origins of rational thought.#TheAbstract


Chimps Are Capable of Human-Like Rational Thought, Breakthrough Study Finds


🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.

Chimpanzees revise their beliefs if they encounter new information, a hallmark of rationality that was once assumed to be unique to humans, according to a study published on Thursday in Science.

Researchers working with chimpanzees at the Ngamba Island Chimpanzee Sanctuary in Uganda probed how the primates judged evidence using treats inside boxes, such as a “weak” clue—for example, the sound of a treat inside a shaken box—and a "strong" clue, such as a direct line of sight to the treat.

The chimpanzees were able to rationally evaluate forms of evidence and to change their existing beliefs if presented with more compelling clues. The results reveal that non-human animals can exhibit key aspects of rationality, some of which had never been directly tested before, which shed new light on the evolution of rational thought and critical thinking in humans and other intelligent animals.

“Rationality has been linked to this ability to think about evidence and revise your beliefs in light of evidence,” said co-author Jan Engelmann, associate professor at the department of psychology at the University of California, Berkeley, in a call with 404 Media. “That’s the real big picture perspective of this study.”

While it’s impossible to directly experience the perspective of a chimpanzee, Engelmann and his colleagues designed five controlled experiments for groups of anywhere from 15 to 23 chimpanzee participants.

In the first and second experiments, the chimps received a weak clue and a strong clue for a food reward in a box. The chimpanzees consistently made their choices based on the stronger evidence, regardless of the sequence in which the clues were presented. In the third experiment, the chimps were shown an empty box in addition to the strong and weak clues. After this presentation, the box with the strong evidence was removed. In this experiment, the chimpanzees still largely chose the weak clue over the empty box.

In the fourth experiment, chimpanzees were given a second “redundant” weak clue—for instance, the experimenter would shake a box twice. Then, they were given a new type of clue, like a second piece of food being dropped into a box in front of them. They were significantly more likely to change their beliefs if the clue provided fresh information, demonstrating an ability to distinguish between redundant and genuinely new evidence.

Finally, in the fifth experiment, the chimpanzees were presented with a so-called “defeater” that undermined the strong clue, such as a direct line of sight to a picture of food inside the box, or a shaken box containing a stone, not a real treat. The chimps were significantly more likely to revise their choice about the location of the food in the defeater experiments than in experiments with no defeater. This experiment showcased an ability to judge that evidence that initially seems strong can be weakened with new information.

“The most surprising result was, for sure, experiment five,” Engelmann said. “No one really believed that they would do it, for many different reasons.”

For one thing, he said, the methodology of the fifth experiment demanded a lot of attention and cognitive work from the chimpanzees, which they successfully performed. The result also challenges the assumption that complex language is required to update beliefs with new information. Despite lacking this linguistic ability, chimpanzees are somehow able to flexibly assign strength to different pieces of evidence.

Speaking from the perspective of the chimps, Engelmann outlined the responses to experiment five as: “I used to believe food was in there because I heard it in there, but now you showed me that there was a stone in there, so this defeats my evidence. Now I have to give up that belief.”

“Even using language, it takes me ten seconds to explain it,” he continued. “The question is, how do they do it? It’s one of the trickiest questions, but also one of the most interesting ones. To put it succinctly, how to think without words?”

To hone in on that mystery, Engelmann and his colleagues are currently repeating the experiment with different primates, including capuchins, baboons, rhesus macaques, and human toddlers and children. Eventually, similar experiments could be applied to other intelligent species, such as corvids or octopuses, which may yield new insights about the abundance and variability of rationality in non-human species.

“I think the really interesting ramification for human rationality is that so many people often think that only humans can reflect on evidence,” Engelmann said. “But our results obviously show that this is not necessarily the case. So the question is, what's special about human rationality then?”

Engelmann and his colleagues hypothesize that humans differ in the social dimensions of our rational thought; we are able to collectively evaluate evidence not only with our contemporaries, but by consulting the work of thinkers who may have lived thousands of years ago. Of course, humans also often refuse to update beliefs in light of new evidence, which is known as “belief entrenchment” or “belief perseveration” (many such cases). These complicated nuances add to the challenge of unraveling the evolutionary underpinnings of rationality.

That said, one thing is clear: many non-human animals exist somewhere on the gradient of rational thought. In light of the recent passing of Jane Goodall, the famed primatologist who popularized the incredible capacities of chimpanzees, the new study carries on a tradition of showing that these primates, our closest living relatives, share some degree of our ability to think and act in rational ways.

Goodall “was the first Western scientist to observe tool use in chimpanzees and really change our beliefs about what makes humans unique,” Engelmann said. “We're definitely adding to this puzzle by showing that rationality, which has so long been considered unique to humans, is at least in some forms present in non-human animals.”

🌘
Subscribe to 404 Media to get The Abstract, our newsletter about the most exciting and mind-boggling science news and studies of the week.




Everyone loses and nobody wins if America decides to resume nuclear testing after a 30 year moratorium.#News #nuclear


Trump Orders Nuclear Testing As Nuke Workers Go Unpaid


Last night Trump directed the Pentagon to start testing nukes again. If that happens, it’ll be the first time the US has detonated a nuke in more than 30 years. The organization that would likely be responsible for this would be the National Nuclear Security Administration (NNSA), a civilian workforce that oversees the American nuclear stockpile. Because of the current government shutdown, 1,400 NNSA workers are on furlough and the remaining 375 are working without pay.

America detonated its last nuke in 1992 as part of a general drawn down following the collapse of the Soviet Union. Four years later, it was the first country to sign the Comprehensive Nuclear-Test Ban Treaty (CTBT) which bans nuclear explosions for civilian or military purposes. But Congress never ratified the treaty and the CTBT never entered into force. Despite this, there has not been a nuke tested by the United States since.
playlist.megaphone.fm?p=TBIEA2…
Trump threatened to resume nuclear testing during his first term but it never happened. At the time, officials at the Pentagon and NNSA said it would take them a few months to get tests running again should the President order them.

The NNSA has maintained the underground tunnels once used for testing since the 1990s and converted them into a different kind of space that verifies the reliability of existing nukes without blowing them up in what are called “virtual tests.” During a rare tour of the tunnel with journalists earlier this year, a nuclear weapons scientist from Los Alamos National Laboratory told NPR that “our assessment is that there are no system questions that would be answered by a test, that would be worth the expense and the effort and the time.”

Right now, the NNSA might be hard pressed to find someone to conduct the test. It employs around 2,000 people and the shutdown has seen 1,400 of them furloughed and 375 working without pay. The civilian nuclear workforce was already having a tough year. In February, the Department of Government Efficiency cut 350 NNSA employees only to scramble and rehire all but 28 when they realized how essential they were to nuclear safety. But uncertainty continued and in April the Department of Energy declared 500 NNSA employees “non-essential” and at risk of termination.

That’s a lot of chaos for a government agency charged with ensuring the safety and effectiveness of America’s nuclear weapons. The NNSA is currently in the middle of a massive project to “modernize” America’s nukes, an effort that will cost trillions of dollars. Part of modernization means producing new plutonium pits, the core of a nuclear warhead. That’s a complicated and technical process and no one is sure how much it’ll cost and how dangerous it’ll be.

And now, it may have to resume nuclear testing while understaffed.

“We have run out of federal funds for federal workers,” Secretary of Energy Chris Wright said in a press conference announcing furlough on October 20. “This has never happened before…we have never furloughed workers in the NNSA. This should not happen. But this was as long as we could stretch the funds for federal workers. We were able to do some gymnastics and stretch it further for the contractors.”

Three days later, Rep. Dina Titus (D-NV) said the furlough was making the world less safe. “NNSA facilities are charged with maintaining nuclear security in accordance with long-standing policy and the law,” she said in a press release. “Undermining the agency’s workforce at such a challenging time diminishes our nuclear deterrence, emboldens international adversaries, and makes Nevadans less safe. Secretary Wright, Administrator Williams, and Congressional Republicans need to stop playing politics, rescind the furlough notice, and reopen the government.”

Trump announced the nuclear tests in a post on Truth Social, a platform where he announces a lot of things that ultimately end up not happening. “The United States has more Nuclear Weapons than any other country. This was accomplished, including a complete update and renovation of existing weapons, during my First Term in office. Because of the tremendous destructive power, I HATED to do it, but had no choice! Russia is second, and China is a distant third, but will be even within 5 years. Because of other countries testing programs, I have instructed the Department of War to start testing our Nuclear Weapons on an equal basis. That process will begin immediately. Thank you for your attention to this matter! PRESIDENT DONALD J. TRUMP,” the post said.

Matt Korda, a nuclear expert with the Federation of American Scientists, said that the President’s Truth social post was confusing and riddled with misconceptions. Russia has more nuclear weapons than America. Nuclear modernization is ongoing and will take trillions of dollars and many years to complete. Over the weekend, Putin announced that Russia had successfully tested a nuclear-powered cruise missile and on Tuesday he said the country had done the same with a nuclear-powered undersea drone. Russia withdrew from the CTBT in 2023, but neither recent test involved a nuclear explosion. Russia last blew up a nuke in 1990 and China conducted its most recent test in 1996. Both have said they would resume nuclear testing should America do it. Korda said it's unclear what, exactly, Trump means. He could be talking about anything from test firing non-nuclear equipped ICBMs to underground testing to detonating nukes in the desert. “We’ll have to wait and see until either this Truth Social post dissipates and becomes a bunch of nothing or it actually gets turned into policy. Then we’ll have something more concrete to respond to,” Korda said.

Worse, he thinks the resumption of testing would be bad for US national security. “It actually puts the US at a strategic disadvantage,” Korda said. “This moratorium on not testing nuclear weapons benefits the United States because the United States has, by far, the most advanced modeling and simulation equipment…by every measure this is a terrible idea.”

The end of nuclear detonation tests has spurred 30 years of innovation in the field of computer modeling. Subcritical computer modeling happens in the NNSA-maintained underground tunnels where detonations were once a common occurrence. The Los Alamos National Laboratories and other American nuclear labs are building massive super computers that are, in part, the result of decades of work spurred by the end of detonations and the embrace of simulation.

Detonating a nuclear weapon—whether above ground or below—is disastrous for the environment. There are people alive in the United States today who are living with cancer and other health conditions caused by American nuclear testing. Live tests make the world more anxious, less safe, and encourage other nuclear powers to do their own. It also uses up a nuke, something America has said it wants to build more of.

“There’s no upside to this,” Korda said. He added that he felt bad for the furloughed NNSA workers. “People find out about significant policy changes through Truth social posts. So it’s entirely possible that the people who would be tasked with carrying out this decision are learning about it in the same way we are all learning about it. They probably have the exact same kinds of questions that we do.”


Breaking News Channel reshared this.



The leaked slide focuses on Google Pixel phones and mentions those running the security-focused GrapheneOS operating system.#cellebrite #Hacking #News


Someone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Details


Someone recently managed to get on a Microsoft Teams call with representatives from phone hacking company Cellebrite, and then leaked a screenshot of the company’s capabilities against many Google Pixel phones, according to a forum post about the leak and 404 Media’s review of the material.

The leak follows others obtained and verified by 404 Media over the last 18 months. Those leaks impacted both Cellebrite and its competitor Grayshift, now owned by Magnet Forensics. Both companies constantly hunt for techniques to unlock phones law enforcement have physical access to.

This post is for subscribers only


Become a member to get access to all content
Subscribe now


Breaking News Channel reshared this.



Why it might have been and may continue to be harder to get new releases from your local library.#News #libraries #Books


Libraries Scramble for Books After Giant Distributor Shuts Down


This story was reported with support from the MuckRock foundation.

One of the largest distributors of print books for libraries is winding down operations by the end of the year, a huge disruption to public libraries across the country, some of which are warning their communities the shut down will limit their ability to lend books.

“You might notice some delays as we (and more than 6,000 other libraries) transition to new wholesalers,” the Jacksonville Public Library told its community in a Facebook post. “We're keeping a close eye on things and doing everything we can to minimize any wait times.”

The libraries that do business with the distributor learned about the shut down earlier this month via Reddit.

Upon learning of her company’s closure, Jennifer Kennedy, a customer services account manager with Baker & Taylor, broke the news on October 6 on r/Libraries Reddit community.

“I just wanted the libraries to know,” Kennedy told 404 Media. “I didn’t want them to be held hostage waiting for books that would never come. I respect them too much for all this nonsense.”

Kennedy’s post prompted other current and former B&T employees to confirm the announcement and express concern for the competitors about to be inundated with requests from the libraries who would be scrambling for new suppliers.

B&T in Memoriam


Baker & Taylor has been in the book business just short of 200 years. Its primary focus was distributing physical copies of books to public libraries. The company also provided librarians with tools that helped them do their jobs more effectively related to collection development and processing.

But the company has spent decades being acquired by and divested from private equity firms, served as a revolving door for senior leadership, and was sued by a competitor earlier this year for alleged data misuse and was almost acquired again in September, this time by a distributor that works with mass-market retailers like Walmart and Target. That deal fell through.

On October 7, Publishers Weekly reported B&T let go of more than 500 employees the day the internal announcement was made. At least one law firm is currently investigating B&T for allegedly violating the federal Worker Adjustment and Retraining Notification (WARN) Act, and it took the company weeks to let account holders know.

Since the internal announcement, Kennedy says customer service staff at B&T have not received guidance on how to respond to inquiries from libraries, leaving them on the frontline and in the dark on issues ranging from whether existing orders would be fulfilled to securing refunds for materials they may have already paid for.

“Some libraries didn’t realize we are much closed as of right now,” Kennedy added.

B&T did not respond when asked for comment.

Kennedy has been with B&T for 16 years. At a time when it's uncommon to remain with one company more than a few years, that’s exactly what many of B&T’s employees have been able to do, until now. The same was true of the libraries who did business with them. Andrew Harant, director of Cuyahoga Falls Library had to consider the library's longstanding business relationship with the company against the roughly 20 percent of books the library had ordered from the beginning of the year they had never received.

“For us, that was about 1,500 items,” which Harant told 404 Media that for a small library is a lot of books they were ordering and not receiving.

Release dates for new books come and go on B&T’s main software platform for viewing and managing orders, Title Source 360. Better known as TS360, Harant realized the platform was updating preordered books never received to on backorder, which was “not sustainable”.

In September, Cuyahoga Falls Library canceled all outstanding orders with B&T.

“We needed to step up and make sure that we’re getting the books for our patrons that they needed,” he said.

Cuyahoga Falls Library was fortunate to have an existing account with the other main distributor on the scene, Ingram Content Group. This has been true for many of the libraries 404 Media reached out to for this story.

“The easier part is re-ordering the book,” Shellie Cocking, Chief of Collections and Technical Services for the San Francisco Public Library, told 404 Media. “The harder part is replacing the tools you use to order books.”

Integrated Fallout


Of the ancillary services B&T offered customers, TS360 was Cocking’s favorite. It helped her streamline collection development tasks, for instance, anticipating how popular a title might be or determining how many quantities of a book to purchase, which for larger libraries with dozens of branches, could be complicated to figure out manually. Once titles were ordered in TS360, B&T shared a Machine-Readable Cataloging (MARC) record that was automatically shared with the library’s API integration using data derived from B&T’s record set. This product, BTCat, was the subject of a lawsuit brought by OCLC earlier this year.

OCLC owns WorldCat, the global union catalog of library collections that lets anyone see what libraries own what items. OCLC alleged in a U.S. district court filing that B&T misused their proprietary bibliographic records to populate its own competing cataloguing database. OCLC also accused B&T of inserted clauses into its contracts where there was overlap with the businesses and customers, requiring libraries to grant B&T access to their cataloging records so the libraries could then license the records back to B&T for BTCat. B&T has denied these claims, accusing OCLC of stifling fair competition in an already consolidated marketplace.

Marshall Breeding, an independent consultant who monitors library vendor mergers has been following all of this rather closely. He says B&T's closure creates a number of bottlenecks for libraries, the primary one being whether suppliers like Ingram or Brodart can absorb thousands of libraries as customers all at once.

“Maybe, maybe not,” Breeding told 404 Media. “It’s going to take them a while to set up the business relationships and technical things that have to be set up for libraries to automatically order books from the providers.”

But one thing is evident.

“Libraries are kind of in a weaker position just scrambling to find a vendor at all,” he added.

Less competition in the market makes for more challenging working conditions all around. Just ask Erin Hughes, director of the Wood Ridge Memorial Library in New Jersey, made the move over to Ingram after a series of negative experiences with B&T in 2021 from late and damaged deliveries to customer service calls that went poorly, to say the least. Hughes worries her experience with B&T will happen again, only this time with Ingram.

Since the Reddit announcement, she's noticed it's a little more difficult to get a rep on the phone and the number of shipments to the library is smaller. But the other way Hughes is seeing the problem play out involves the consortium her library belongs to. While she may have foregone B&T years ago, her network hasn't, which affects the operability of InterLibrary Loan lending.

“The resource sharing is going to be off for a bit,” Hughes told 404 Media.

Amazon Incoming


If Ingram’s service stagnates due to the B&T cluster, Hughes says she'll use Amazon, which recently launched its own online library hub, offering competitive pricing. One downside, says Hughes, is that it's Amazon.

“No, we do have a little bit of pause around Amazon,” she added. “But we’re at a point now where Ingram actually does supply most of the books for Amazon. So we’re already in the devil’s pocket. It’s all connected. It’s all integrated. And as much as I personally don’t care for the whole thing, I don’t really see a lot of other options.”

It's hard not to think this outcome was predictable and also preventable. We know what happens when private equity gets involved with businesses not expected to generate high growth or returns, as well as what happens when there's too little market competition in any given sector. It can't be a cautionary tale because market consolidation is in itself a cautionary tale.

But it’s also worth acknowledging how the timing could not be worse. Library use is way up right now, which is indicative of the times. People are buying less for various reasons. People also seem to like the idea of putting a little friction between their media consumption habits and Big Brother, even at the expense of a little convenience.

“We kind of made our own bed a little bit because we didn’t branch out,” said Hughes. “We didn’t find other solutions to this, and we were relying essentially on two giant companies, one of which folded so quick it was not even funny.”


reshared this



Sudan: il satellite racconta ciò che il mondo ignora


Le immagini pubblicate dalla Yale University documentano massacri di massa nella città sudanese di El-Fasher, conquistata dalle Forze di Supporto Rapido (RSF) domenica scorsa al termine di un assedio durato oltre 18 mesi. Pozze di sangue e cumuli di corpi testimoniano l’avvio di un processo sistematico e intenzionale di pulizia etnica delle comunità non arabe.

“Le azioni delle RSF documentate in questo rapporto potrebbero configurare crimini di guerra e crimini contro l’umanità e potrebbero raggiungere il livello di genocidio”, si legge.

Quella che sconvolge il Sudan dall’aprile 2023 non è però una guerra dimenticata. È diventata la più grave catastrofe umanitaria mondiale, con oltre 30 milioni di persone bisognose di assistenza e civili trasformati in bersagli di una violenza indiscriminata.

Oggi si assiste a una nuova escalation genocidiaria. Le condizioni che rendono possibili tragedie come l’eccidio di El-Fasher non sorgono dunque per caso. Sono il risultato del ridimensionamento incessante della diplomazia e della cooperazione internazionale, del cinismo di fronte a gravi violazioni dei diritti umani e del diritto umanitario, e della costante anteposizione del profitto dei mercanti di armi alla costruzione della pace. Da chi, insomma, si trincera dietro il principio per cui il diritto internazionale valga fino ad un certo punto.

Invece, la sicurezza e la pace si costruiscono guardando nella direzione opposta, quella dei diritti fondamentali. Prima di tutto.

L'articolo Sudan: il satellite racconta ciò che il mondo ignora proviene da Possibile.

Federico reshared this.

in reply to Fediverso Possibile

@possibile allucinante come a nessuno freghi alcunché di questi conflitti... È il problema delle battaglie politiche


Su #Sicurnauti è online la sezione sulle minacce digitali più avanzate, dedicata a #studenti e #genitori. Scopri i contenuti su #Unica.

Qui il video ➡ youtube.com/watch?v=9GLq2EyFyx…
Qui l’infografica ➡ unica.istruzione.gov.