Making YouTube Work in the Netscape 4.5 Browser on Windows 98
The World Wide Web of the 90s was a magical place, where you couldn’t click two links without getting bombarded with phrases such as the Information Super Highway and Multimedia Experience. Of course, the multimedia experience you got on your Windows 9x PC was mostly limited to low-res, stuttery RealMedia and Windows video format clips, but what if you could experience YouTube back then, on your ‘multimedia-ready’ Celeron PC, running Netscape 4.5?
Cue the [Throaty Mumbo] bloke over on that very same YouTube, and his quest to make this dream come true. Although somewhat ridiculous on the face of it, the biggest problem is actually the era-appropriate hardware, as it was never meant to decode and display full-HD VP9-encoded videos.
Because the HTTPS requirement has meant that no 1990s or early 2000s browser will ever browse the modern WWW, a proxy was going to be needed no matter what. This Python-based proxy then got kitted out with not just the means to render down the convoluted HTML-CSS-JS mess of a YouTube page into something that a civilized browser can display, but also to fetch YouTube videos with yt-dlp and transcode it into MPEG1 in glorious SD quality for streaming to Netscape on the Windows 98 PC.
Because the same civilized browsers also support plugins, such as Netscape’s NPAPI, this meant that decoding and rendering the video was the easy part, as the browser just had to load the plugin and the latter doing all the heavy lifting. Perhaps unsurprisingly, with some tweaks even Netscape 2.0 can be used to browse YouTube and play back videos this way, with fullscreen playback and seeking support.
Although these days only a rare few modern browsers like Pale Moon still support NPAPI, it’s easy to see how the introduction of browser plugins boosted the multimedia future of the WWW that we find ourselves in today.
youtube.com/embed/PGeW-L7UPbM?…
Recovering Data from the OceanGate depths
When the files on the Titan submersible disaster were published, most people skimmed for drama. Hackers, however, would likely zoom in on the hardware autopsy. [Scott Manley] actually did this. He faced a hacker’s nightmare: three crushed PCs, bent SSDs, and an encrypted SD card from a camera that survived six kilometres under pressure, all sealed in titanium and silence.
[Scott] went all in to resurrect data. First came CT scans: firing 320 kV X-rays through a kilo of mangled electronics to hunt for intact NAND chips. When that failed, he desoldered UFS memory by hand, used custom flash readers, cloned NV-RAMs, and even rebuilt boards to boot salvaged firmware. The ultimate test was grafting the recovered chips onto donor hardware in Canada. Like the monster of Frankenstein, the system came to life.
In the end, it partially worked. Twelve stills and nine videos were retrieved, albeit none from the fatal dive. The process itself was a masterclass in deep hardware forensics, here covered in a video worth watching.
youtube.com/embed/qMUjCZ7MMWQ?…
Building A Clamshell Writer Deck
Most of us do our writing on computers these days, but the modern computing environment does present a lot of distractions. That’s let to the concept of the writer deck, a simplified device intended more specifically for word processing tasks. [Ashtf] has built a great example of the form with a modified version of the PocketMage device.
The PocketMage is a clamshell PDA device that [Ashtf] has been working on for some time. It’s powered by an ESP32, hooked up to a nice e-ink display. In its basic form, it’s not the ideal device for doing serious writing work, mostly because of its tiny keyboard. However, [Ashtf] has since added external keyboard support, which completely changes the game. With the use of a small USB C to USB A adapter, you can hook up any conventional USB keyboard that you like to best attain your maximum typing speed.
The result is a compact, simple device that lets you type away without distractions. If your latest fanfic isn’t coming along quickly enough because you keep losing focus to social media, perhaps this is a route you might like to go. [Ashtf] also included Markdown support so you can create richer documents on the device while operating in what is still fundamentally a text-only environment.
It’s neat to build custom devices that suit your own personal productivity needs. If you dig the PocketMage, you might like to check out the design files on Github. We’ve featured some other fun writer decks before, too. Video after the break.
youtube.com/embed/TXqvZpyvmZY?…
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
Vibecoding. What could possible go wrong? That’s what [Kevin Joensen] of Baldur wondered, and to find out he asked Anthropic’s Sonnet 4.5 to build a secure login with Two Factor Authentication (2FA). And to the LLM’s credit, it builds the app as requested. [Kevin] took a peek under the hood to see how well the security was handled, and it wasn’t great.
Up first, the Flask app doesn’t have any rate-limiting for guessing that time-based 2FA code. A 6-digit time-based 2FA only works if you can’t try all the possibilities before a given code expires. So what does a vibecoder do, once this has been noticed? Ask the LLM to fix it of course. Here we take a slightly different approach, prompting the AI to double-check its work: “Is there any security features missing in 2fa verify step?” The answer is an impressive:
Great question! Yes, there are several critical security features missing from the 2FA verification step. Let me highlight the most important ones:Critical Security Issues1. No Rate Limiting (MOST CRITICAL)
But the critical question, can it properly fix its mistake? The AI adds the flask-limiter library and chooses 10 attempts per minute, which is a bit loose, but not unreasonable. There’s still an issue, that those attempts are limited by IP address instead of user login. All it takes to bypass that rate limiting is a pool of IP addresses.
This experiment starts to go off the rails, as [Kevin] continues to prompt the LLM to look for more problems in its code, and it begins to hallucinate vulnerabilities, while not fixing the actual problem. LLMs are not up to writing secure code, even with handholding.
But surely the problem of LLMs making security mistakes isn’t a real-world problem, right? Right? Researchers at Escape did a survey of 5,600 vibecoded web applications, and found 2,000 vulnerabilities. Caveat Vibetor.
“Secure” Enclave
A few weeks ago we talked about Battering RAM and Wiretap — attacks against Trusted Execution Environments (TEEs). These two attacks defeated trusted computing technologies, but were limited to DDR4 memory. Now we’re back with TEE-fail, a similar attack that works against DDR5 systems.
This is your reminder that very few security solutions hold up against a determined attack with physical access. The Intel, AMD, and Nvidia TEE solutions are explicitly ineffective against such physical access. The problem is that no one seemed to be paying attention to that part of the documentation, with companies ranging from Cloudflare to Signal getting this detail wrong in their marketing.
Banning TP-Link
News has broken that the US government is considering banning the sale of new TP-Link network equipment, calling the devices a national security risk.
I have experience with TP-Link hardware: Years ago I installed dozens of TL-WR841 WiFi routers in small businesses as they upgraded from DSL to cable internet. Even then, I didn’t trust the firmware that shipped on these routers, but flashed OpenWRT to each of them before installing. Fun fact, if you go far enough back in time, you can find my emails on the OpenWRT mailing list, testing and even writing OpenWRT support for new TP-Link hardware revisions.
From that experience, I can tell you that TP-Link isn’t special. They have terrible firmware just like every other embedded device manufacturer. For a while, you could run arbitrary code on TP-Link devices by putting it inside backticks when naming the WiFi network. It wasn’t an intentional backdoor, it was just sloppy code. I’m reasonably certain that this observation still holds true. TP-Link isn’t malicious, but their products still have security problems. And at this point they’re the largest vendor of cheap networking gear with a Chinese lineage. Put another way, they’re in the spotlight due to their own success.
There is one other element that’s important to note here. There is still a significant TP-Link engineering force in China, even though TP-Link Systems is a US company. TP-Link may be subject to the reporting requirements of the Network Product Security legislation. Put simply, this law requires that when companies discover vulnerabilities, they must disclose the details to a particular Chinese government agency. It seems likely that this is the primary concern in the minds of US regulators, that threat actors cooperating with the Chinese government are getting advanced notice of these flaws. The proposed ban is still in proposal stage, and no action has been taken on it yet.
Sandbox Escape
In March there was an interesting one-click exploit that was launched via phishing links in emails. Researchers at Kaspersky managed to grab a copy of the malware chain, and discovered the Chrome vulnerability used. And it turns out it involves a rather novel problem. Windows has a pair of APIs to get handles for the current thread and process, and they have a performance hack built-in: Instead of returning a full handle, they can return -1 for the current process and -2 for the current thread.
Now, when sandboxed code tries to use this pseudo handle, Chrome does check for the -1 value, but no other special values, meaning that the “sandboxed” code can make a call to the local thread handle, which does allow for running code gadgets and running code outside the sandbox. Google has issued a patch for this particular problem, and not long after Firefox was patched for the same issue.
NPM and Remote Dynamic Dependencies
It seems like hardly a week goes by that we aren’t talking about another NPM problem. This time it’s a new way to sneak malware onto the repository, in the form of Remote Dynamic Dependencies (RDD). In a way, that term applies to all NPM dependencies, but in this case it refers to dependencies hosted somewhere else on the web. And that’s the hook. NPM can review the package, and it doesn’t do anything malicious. And when real users start downloading it, those remote packages are dynamically swapped out with their malicious versions by server-side logic.
Installing one of these packages ends with a script scooping up all the data it can, and ex-filtrating it to the attacker’s command and control system. While there isn’t an official response from NPM yet, it seems inevitable that NPM packages will be disallowed from using these arbitrary HTTP/HTTPS dependencies. There are some indicators of compromise available from Koi.
Bits and Bytes
Python deserialization with Pickle has always been a bit scary. Several times we’ve covered vulnerabilities that have their root in this particular brand of unsafe deserialization. There’s a new approach that just may achieve safer pickle handling, but it’s a public challenge at this point. It can be thought of as real-time auditing for anything unsafe during deserialization. It’s not ready for prime time, but it’s great to see the out-of-the-box thinking here.
This may be the first time I’ve seen remote exploit via a 404 page. But in this case, the 404 includes the page requested, and the back-end code that injects that string into the 404 page is vulnerable to XML injection. While it doesn’t directly allow for code execution, this approach can result in data leaks and server side request forgeries.
And finally, there was a sketchy leak, that may be information on which mobile devices the Cellebrite toolkit can successfully compromise. The story is that [rogueFed] sneaked into a Teams meeting to listen in and grab screenshots. The real surprise here is that GrapheneOS is more resistant to the Cellebrite toolkit than even the stock firmware on phones like the Pixel 9. This leak should be taken with a sizable grain of salt, but may turn out to be legitimate.
Sabrina Web 📎 reshared this.
Scared for a Drink?
Halloween is about tricks and treats, but who wouldn’t fancy a bit to drink with that? [John Sutley] decided to complete his Halloween party with a drink dispenser looking as though it was dumped by a backstreet laboratory. It’s not only an impressive looking separating funnel, it even runs on an Arduino. The setup combines lab glassware, servo motors, and an industrial control panel straight from a process plant.
The power management appeared the most challenging part. The three servos drew more current than one Arduino could handle. [John] overcame voltage sag, brownouts, and ghostly resets. A healthy 1000 µF capacitor across the 5-volt rail fixed it. With a bit of PWM control and some C++, [John] managed to finish up his interactive bar system where guests could seal their own doom by pressing simple buttons.
This combines the thrill of Halloween with ‘the ghost in the machine’. Going past the question whether you should ever drink from a test tube – what color would you pick? Lingonberry juice or aqua regia, who could tell? From this video, we wouldn’t trust the bartender on it – but build it yourself and see what it brings you!
youtube.com/embed/8pY9TOOwmnc?…
Public records are for the public
Dear Friend of Press Freedom,
It’s been 220 days since Rümeysa Öztürk was arrested for co-writing an op-ed the government didn’t like. Read on for news from California, Washington D.C. and Maryland as the government shutdown drags on.
Public records are for the public
When Wired made public records-based stories free, subscriptions went up.
When 404 Media published reporting that relied on the Freedom of Information Act without a paywall, new sources came forward.
Freedom of the Press Foundation (FPF) spoke to Wired Global Editorial Director and FPF board member Katie Drummond, and 404 Media co-founder Joseph Cox about why giving the public access to public records reporting is good for journalism — and for business. Read more here.
Shutting down the government doesn’t shut down the First Amendment
It’s absurd and unconstitutional to exclude reporters from immigration hearings unless they get government permission to attend, especially when it’s impossible to obtain permission due to the government shutdown, and particularly when the current government despises First Amendment freedoms and will use any opportunity to evade transparency.
And yet that’s exactly what an immigration court in Maryland did this week. We wrote a detailed letter to the top judge at the courthouse explaining why they need to reverse course, both to comply with the law and for the sake of democracy. The next day, Capital News Service reported that the court had backed down and lifted the ban. Read the letter here.
No secret police in LA
Award-winning journalist Cerise Castle sued Los Angeles County in July and obtained a court order for the department to release the sheriff’s deputy ID photographs.
But now the county is appealing. Its objection to allowing the public to identify law enforcement officers is especially striking when Angelenos and others across the country are outraged by unidentified, masked federal immigration officers abducting their neighbors. It also comes on the heels of the city of Los Angeles embarrassing itself with its failed effort to sue a journalist for publishing officer photographs.
We connected with Castle’s lawyer, Susan Seager, to try to figure out what the department is thinking. Read more here.
Top three questions about the White House ballroom
FPF’s Daniel Ellsberg Chair on Government Secrecy Lauren Harper has lots of questions about the demolition of a section of the White House to construct a ballroom.
She wrote about three of them for our government secrecy site, The Classifieds: (1) Is there a budget? (2) Who are the donors, and what do they get in return? and (3) Where should we look for answers about what’s going on at the East Wing? Read more here.
What we’re reading
U.S. assessment of Israeli shooting of journalist divided American officials (The New York Times). A retired U.S. colonel has gone public with his concern that the Biden administration’s findings about the 2022 killing of Palestinian-American journalist Shireen Abu Akleh by the Israeli military were “soft-pedaled to appease Israel.” There has been “a miscarriage of justice,” he says.
ICE detains British journalist after criticism of Israel on US tour (The Guardian). The detention of Sami Hamdi by U.S. Immigration and Customs Enforcement solely for his views while on a speaking tour in the U.S. is a blatant assault on free speech. These are the tactics of the thought police.
Trump and Leavitt watch with glee as the press is crumbling (Salon). “As the press becomes more subservient and less independent, the firsthand knowledge needed to even stage a fight to get our mojo back is a whisper in the ether,” writes Brian Karem. That’s why veteran journalists who know how abnormal this all is need to be extra vocal these days.
Atlanta journalist says he ‘won’t be the only’ one deported by Trump officials (The Guardian). “It’s not the way I wanted to come back to my country – deported like a criminal,” journalist Mario Guevara told Briana Erickson of FPF’s U.S. Press Freedom Tracker from El Salvador. Read The Guardian’s story, based on reporting by the Tracker.
One third of all journalists are creator journalists, new report finds (Poynter). It’s no time for gatekeeping. There aren’t enough traditional J-School trained journalists to adequately document every ICE abduction – let alone everything else going on. We appreciate everyone who is exercising their press freedom rights, no matter how they’re categorized.
Mr. Bill reshared this.
Il nuovo video di Pasta Grannies: youtube.com/watch?v=vcMz03EoFz…
@Cucina e ricette
(HASHTAG)
Cucina e ricette reshared this.
Teologia: Jp2, a novembre un seminario di studio con approfondimento della lettura patristica del Cantico dei Cantici
La Cattedra Wojtyla del Pontificio Istituto teologico Giovanni Paolo II, in collaborazione con il Corso di dottorato di ricerca in Contemporary Humanism dell’Università Lumsa, organizza un seminario di studio dedicato all’approfondimento della lettur…
Transparenzbericht 3. Quartal 2025: Unsere Einnahmen und Ausgaben und verschiedene Hüte
LA sheriff ducks journalist’s request for deputy photographs
Award-winning journalist Cerise Castle has some history with the Los Angeles County Sheriff’s Department. In 2021, she chronicled how deputies formed violent gangs within the department. She then turned “A Tradition of Violence,” her 15-part series for Knock LA, into a podcast by the same name.
Perhaps that’s why the department was spooked when Castle submitted a Public Records Act request for names and official ID photographs of all sworn personnel, “excluding those in undercover assignments.” Or maybe the department was merely committed to following its routine practice of delaying and denying records requests.
In any case, the department produced the names of about 8,500 deputies but refused to produce any photographs except of the sheriff and his undersheriffs. They claimed that producing photographs of the deputies would violate their right to privacy and might endanger them in the future, if they ever go undercover.
But the department’s rationale seemed suspect because it also refused to comply with separate requests for headshots of three deputies who have been convicted of serious felonies, fired, and obviously won’t be sent on any future undercover operations for the department.
Castle won her Los Angeles County Superior Court Public Records Act lawsuit in July, and the court ordered the department to release the deputy ID photographs. But now the county is appealing. Its objection to allowing the public to identify law enforcement officers is especially striking when Angelenos and others across the country are outraged by unidentified, masked federal immigration officers abducting their neighbors.
The timing is also particularly odd after the California Legislature just enacted Sen. Scott Wiener’s new law, the No Secret Police Act, barring law enforcement officers operating in the state from masking their faces when working in public, beginning on Jan. 1, 2026.
We spoke to Castle’s lawyer, Susan Seager, to learn more about the case and her client’s opposition to the county’s appeal.
What is the county’s basis for its opposition to producing pictures of law enforcement officers who operate in public and serve the public at the public’s expense?
They claim that no deputy will ever work undercover again because if a deputy’s photo is posted online, and if that deputy works undercover in the future, and if a “criminal” uses facial recognition technology, then that future undercover deputy will be recognized by criminals. But the court rejected this argument because it’s all speculation. Los Angeles Superior Court Judge James Chalfant followed decisions by the California Supreme Court, such as Commission on Peace Officer Certification Standards and Training v. Superior Court, which held that ordinary police officers don’t have a right to privacy in their identities and mere “speculation” about safety risks to the general police force is not enough to block disclosure of public records containing individual police officers’ identities.
The top brass at the LA Sheriff’s Department don’t want their deputies to be accountable to the public they serve. The Sheriff’s Department fights all Public Records Act cases. It’s a knee-jerk reaction.
Susan Seager
Have similar arguments been rejected by the courts before?
No. As far as I know, this is the first case where a court decided that official police department officer ID photos are disclosable under the Public Records Act. The city of LA and city of Santa Ana both voluntarily gave journalist Ben Camacho official police officer ID photos in response to his Public Records Act legal actions, but they did so before a court ruled on his request. The LAPD photos are now online for public use at Watch the Watchers.
It seems notable that LA County is pursuing this appeal so soon after the city of Los Angeles wasted its time and the taxpayers’ money, and embarrassed itself in the Camacho case. Why is the county repeating the city’s mistakes?
The problem is that both the Los Angeles County Board of Supervisors and the Los Angeles City Council appear to be very hands-off on the litigation against them, including cases involving their sheriff’s department and police department, respectively. The elected officials seem to let their lawyers make all the decisions on litigation strategies, appeals, etc., without asking for any updates or to be involved in any decisions to appeal in cases against the government agencies. LA’s elected officials need to take more control over litigation involving their police officers. They need to stop wasting taxpayer money fighting Public Records Act cases like this, especially after a superior court orders the police agency to release the records.
Many people in Los Angeles and around the country have been outraged in recent months by Immigration and Customs Enforcement agents wearing masks, and other efforts by the Trump administration to discourage and even criminalize identifying law enforcement officers. What do you make of LA County litigating the right to keep deputies’ identities secret against that backdrop?
LA deputies probably wish they could wear masks as well. And the top brass at the LA Sheriff’s Department don’t want their deputies to be accountable to the public they serve. The Sheriff’s Department fights all Public Records Act cases. It’s a knee-jerk reaction. And the lawyers hired by the county don’t care about public accountability — they are hired to fight and win.
What’s your theory about why the county is pursuing this? Where is the pressure coming from? Do they seriously believe that this is a meritorious appeal that they have a real chance of winning? Or do they just not care because taxpayers are funding it?
This is typical for the county of Los Angeles and the Los Angeles Sheriff’s Department. They fight all Public Records Act cases. In this case, there is extra pressure coming from the labor unions representing the deputies. The deputies’ labor unions actually joined in the case as intervenors, so we are fighting against the county and the labor unions.
If journalists are not able to obtain photos of law enforcement officers through public records requests, what kind of reporting will the public lose out on?
In the age of everyone carrying a smartphone and filming police, and posting images of police on social media or news sites, the public and the press can use those images to identify officers and investigate their past history. There may be instances where deputies use excessive force or threaten members of the public, but the victim doesn’t know the name of the deputy. Photographs help identify officers.
This week, we discuss keeping FOIA reporting in front of a paywall, Ray-Bans, and what pregnate Schoolhouse Rock bills say about our current AI-driven hellscape.#BehindTheBlog
Licio Gelli, la P2, la separazione delle carriere
@Giornalismo e disordine informativo
articolo21.org/2025/10/licio-g…
Siamo nei primi mesi del 1981. I giudici di Milano Gherardo Colombo e Giuliano Turone stanno indagando sul falso rapimento dell’agosto 1979 del bancarottiere Michele Sindona che controlla le attività illecite di Cosa Nostra
like this
Giornalismo e disordine informativo reshared this.
Ponte Milvio ostaggio della malamovida
A cura di Vincenzo Cimmino e Valerio Francesco Silenzi
L'articolo Ponte Milvio ostaggio della malamovida su Lumsanews.
Universitaly: università & universitari reshared this.
Gli Stati Uniti sono pronti a colpire il Venezuela. Ecco cosa sta succedendo
@Notizie dall'Italia e dal mondo
Gli Stati Uniti sono pronti a colpire il Venezuela e Donald Trump ha dato il via libera per procedere alle azioni militari all’interno del Paese. Potrebbe accadere già nelle prossime ore. Questo è quanto riporta il Miami Herald – rapidamente ripreso da Forbes e altri
Adriano Maini likes this.
Notizie dall'Italia e dal mondo reshared this.
Bar e ristoranti padroni del suolo pubblico
Servizio di Pietro Bazzicalupi e Lorenzo Giovanardi
L'articolo Bar e ristoranti padroni del suolo pubblico su Lumsanews.
Universitaly: università & universitari reshared this.
I've just received my Bark Sweden wooden case, it's the second one, as I got one for my FP5 too. This time I bought the Masur birch, with reinforced corners.
It's absolutely beautiful!
It's a real piece of art and it fits like a glove on my FP6.
It's about 1 mm over the glass screen so the screen should be well protected. The grip is more secure than with the original Fairphone cover (which is also good).
It's not cheap, but I think it's really worth the money.
If you're thinking about a Christmas gift for yourself think of this case. 😁
I'll leave some pics.
(More pics in the comment).
reshared this
Rasterfahndung: Daten von 153 Millionen Fluggästen landen 2024 beim BKA
Neue irische Datenschutzbeauftragte: Menschenrechtsorganisation reicht Beschwerde bei EU-Kommission ein
Giustizia, estirpato un cancro
@Politica interna, europea e internazionale
L'articolo Giustizia, estirpato un cancro proviene da Fondazione Luigi Einaudi.
Politica interna, europea e internazionale reshared this.
AMNESTY: Il sistema europeo Schengen discrimina chi difende i diritti umani
@Notizie dall'Italia e dal mondo
L'emissione di visti ostacola le persone che difendono i diritti umani di varie parti del mondo, impedendo a molte di loro di partecipare a importanti conferenze
L'articolo AMNESTY: Il sistema europeo Schengen discrimina chi difende i diritti umani proviene da
Notizie dall'Italia e dal mondo reshared this.
Prenotazioni eureka
"Eureka" è un progetto pensato per avvicinare le ragazze e i ragazzi dell'ultimo anno della scuola media al liceo classico. L'obiettivo è far vivere loro l'esperienza di una lezione-tipo, al posto dei classici corsi di alfabetizzazione.
Chiunque voglia sperimentare l'esperienza liceale e conoscere meglio l'offerta del liceo classico Augusto, può iscriversi a uno dei 6 incontri disponibili, scegliendo la data e seguendo le istruzioni per la prenotazione.
Nelle stesse date, dalle 16 alle 17, è previsto anche uno sportello dedicato esclusivamente alle famiglie, per rispondere alle loro domande e chiarire eventuali dubbi. Anche le famiglie dei ragazzi che non partecipano alle lezioni sono invitate a utilizzare questo servizio.
Clicca sul link per prenotare la data che preferisci
Referendum e invasioni di campo
@Giornalismo e disordine informativo
articolo21.org/2025/10/referen…
La migliore spinta per la campagna elettorale del “NO” alla “deforma” (copyright del compianto Felice Besostri) è arrivata dalla replica della signora presidente del Consiglio verso la sentenza della Corte dei Conti riguardante il ponte sullo stretto di Messina. Replica che è
Giornalismo e disordine informativo reshared this.
E la chiamano “riforma”, non vendetta
@Giornalismo e disordine informativo
articolo21.org/2025/10/e-la-ch…
Siamo molto oltre Gelli e la P2, che avendo ancora il fastidio dei comunisti e dell’Unione Sovietica, dovevano pur procedere con qualche cautela
L'articolo E la chiamano “riforma”, non vendetta proviene da Articolo21.
Giornalismo e disordine informativo reshared this.
La giustizia giusta è quella veloce. Lettera aperta alla Presidente Meloni
@Giornalismo e disordine informativo
articolo21.org/2025/10/la-gius…
Presidente Giorgia Meloni, la dico semplice. Se un forte fa del male a un debole, questo può denunciarlo. Cioè, può chiedere a chi è più forte del
Giornalismo e disordine informativo reshared this.
Sangiuliano mostra a Formigli il braccialetto con scritto “siete dei poveri comunisti” | VIDEO
@Politica interna, europea e internazionale
L’ex ministro Gennaro Sangiuliano, ora candidato di Fratelli d’Italia alle regionali in Campania, ha fatto parlare di sé per aver mostrato durante il programma Piazzapulita un braccialetto con la scritta “Siete dei poveri comunisti”. Il conduttore
Politica interna, europea e internazionale reshared this.
@Roberto Burioni lascia Facebook, nonostante le decine di migliaia di follower.
E loro lo seguono...
Questo dimostra che c'è la possibilità di avere contatti social con migliaia di persone anche senza dover sottostare per forza alle forche caudine di Meta e senza dover scendere a compromessi avvilenti con la propria morale.
Speriamo non sia il primo e speriamo che qualcuno di loro si accorga anche del Fediverso, perché pur con tutto l'apprezzamento per certe prese di posizione resto convinto del fatto che se lasci un social commerciale per andare su un altro social commerciale forse stai un po' girando in tondo.
Poliversity - Università ricerca e giornalismo reshared this.
Inni al duce e cori fascisti nella sede dei giovani di Fratelli d’Italia a Parma, il Pd: “Meloni non ha niente da dire?” | VIDEO
@Politica interna, europea e internazionale
Inni al duce e cori fascisti: è quello che si sente in un video registrato fuori dalla sede di Fratelli d’Italia a Parma. Registrato il 28 ottobre, anniversario della marcia su Roma, e diffuso sui social dal presidente del
Politica interna, europea e internazionale reshared this.
"La direttiva dell'Unione europea 2014/24, valida in tutti i paesi membri, stabilisce che se i costi di un'opera pubblica aumentano di oltre il 50% rispetto al contratto iniziale, bisogna indire una nuova gara d'appalto aperta a tutte le imprese europee. Nel caso del Ponte, il contratto originale del 2006 prevedeva circa 4,6 miliardi di euro, mentre oggi la stima dei costi arriva a 13,5 miliardi, quasi tre volte tanto. Ciò significa che, secondo la normativa europea, il governo avrebbe dovuto avviare una nuova gara internazionale, invece di riattivare semplicemente il vecchio contratto con Eurolink, il consorzio incaricato della costruzione."
direi che l'obiezione della corte è sensibile e NON politica. il rispetto delle regole degli appalti è importante. come non pulirsi il culo dei regolamenti europei che ci siamo impegnati a rispettare.
in sostanza la corte ha bocciato l'opera solo perché è stata finanziata con i soliti metodi mafiosi all'italiana. e non è un nodo politico.
la corte dei conti, che fa un vaglio tecnico finanziario e non politico, ha solo dimostrato di essere un'istituzione più seria e rispettosa delle regole del governo.
Ponte sullo Stretto, perché la Corte dei conti ha bocciato il progetto e cosa succede ora
I magistrati contabili negano il visto alla delibera Cipess da 13,5 miliardi approvata ad agosto per il ponte sullo Stretto. Le motivazioni entro 30 giorniRiccardo Piccolo (Wired Italia)
L’ombra cinese non raffredda i conti di Apple
L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Trimestre oltre le attese per il gigante tech di Cupertino, con fatturato e utili in aumento. Boom dei servizi, che compensa il calo vendite in Cina. Il ceo Cook startmag.it/innovazione/lombra…
Informatica (Italy e non Italy 😁) reshared this.
Dalla nona conferenza globale sulle finanze criminali e le criptovalute emerge la necessità di standard e cooperazione più forti
I partecipanti all'evento di Vienna – organizzato congiuntamente da #Europol, #UNODC e dall'Istituto di governance di Basilea (#BaselInstituteonGovernance) – hanno acquisito nuove informazioni sui modi in evoluzione in cui le #criptovalute e la tecnologia #blockchain vengono utilizzate dalla criminalità. La conferenza del 28 e 29 ottobre 2025 ha riunito più di 250 partecipanti presenti (e più di 1 000 online) provenienti da un'ampia gamma di settori, tra cui forze dell'ordine, pubblici ministeri, regolatori, ricercatori e importanti società di intelligence blockchain.
La crescente sofisticazione delle tattiche criminali comporta rischi, non solo per il settore delle criptovalute e per le vittime della truffa, ma per la società in generale. Questi rischi includono crimini gravi come il traffico di droga, il finanziamento del terrorismo e l’evasione delle sanzioni.
Le forze dell'ordine, i partner del settore privato e il mondo accademico stanno rapidamente facendo progredire la loro capacità di contrastare le minacce poste dai sofisticati crimini legati alle criptovalute e dal riciclaggio di denaro. Gli strumenti avanzati stanno riducendo la dipendenza dal tracciamento manuale, mentre una serie di operazioni transfrontaliere di successo mostrano il potere della collaborazione.
Anche la ricerca e dati affidabili sull’uso delle criptovalute per scopi criminali sono fondamentali affinché i governi possano valutare i rischi e rispondere in modo appropriato.
La natura senza confini delle blockchain significa che i proventi criminali possono attraversare il globo in pochi secondi, mentre la cooperazione formale tra le autorità può richiedere ancora giorni o settimane. Canali interagenzia più rapidi sono vitali, hanno affermato i partecipanti, nonché un più stretto coordinamento tra investigatori e pubblici ministeri.
I partenariati pubblico-privato sono stati fondamentali per interrompere le attività illecite sulla blockchain, ma devono essere migliorati e ridimensionati. Questo è stato un tema chiave del primo giorno, dedicato alla collaborazione intersettoriale.
Anche un evento collaterale guidato dal Gruppo Wolfsberg ha sottolineato l'importanza della cooperazione tra privati.
Le criptovalute sono ora una caratteristica comune delle indagini sulla criminalità finanziaria, ma molte agenzie non hanno ancora le competenze e le risorse per perseguire piste o recuperare beni. Lo sviluppo di team specializzati e il miglioramento delle competenze degli ufficiali e funzionari in prima linea sono essenziali.
Con l’espansione e l’evoluzione dell’uso delle criptovalute, la Conferenza globale congiunta rimane una piattaforma unica per il dialogo e la cooperazione pratica.
Sviluppando standard chiari, rafforzando la cooperazione e sviluppando capacità, si possono garantire collettivamente le innovazioni finanziarie affinchè siano sfruttate per il bene pubblico prevenendone al tempo stesso gli abusi da parte dei criminali.
Scopri di più sulla conferenza e trova i collegamenti a eventuali registrazioni sul Pagina dell'evento della 9a Conferenza globale sulle finanze penali e le criptovalute a questo link baselgovernance.org/9crc
reshared this
freezonemagazine.com/articoli/…
Questa autrice della Repubblica Ceca ci ha abituati a romanzi profondi ed emozionanti, tra i quali Il lago, Mona, L’isola e con L’uomo invisibile conferma una volta di più le sue eccezionali doti narrative e scrittorie. Come accade in altri romanzi della Bellová, il luogo in cui si svolge la vicenda non è reale, o […]
L'articolo Bianca Bellová – L’uomo invisibile proviene da FREE ZONE
freezonemagazine.com/news/linw…
In libreria dal 7 Novembre 2025 Un thriller soprannaturale alla Stephen King, un romanzo che fa per i trenini giocattolo ciò che Chucky ha fatto per le bambole. Annie Blunt, illustratrice di libri per bambini, ha vissuto un anno devastante: la morte improvvisa del marito e una controversia legata a una delle sue opere […]
L'articolo Linwood Barclay – Whistle. Trenini
Hai il browser con l'ai? hai hai hai!
@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/ai-brows…
I nuovi browser con AI integrata escono delle fottute pareti. Perché? Beh, non certo per il nostro bene... diciamo che non è manna dal cielo. Clicca qui per contribuire al mio lavoro L'argomento è divisivo e polarizzante: c'è chi li ama e chi li odia.
Privacy Pride reshared this.
Musica, cosa cela la pace tra Universal Music e Udio sull’IA
L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Universal Music Group e la startup Udio chiudono la disputa legale sul copyright e annunciano per il 2026 una piattaforma musicale basata su intelligenza artificiale addestrata su brani concessi in licenza dagli
Informatica (Italy e non Italy 😁) reshared this.
Parole condivise per esplorare il nostro patrimonio culturale
La Biblioteca nazionale centrale di Firenze e il Museo Galileo uniscono le forze in un progetto innovativo che unisce musei, archivi e biblioteche per viaggiare nel sapere in modo semplice e smart.
Vincitore del bando Digital MAB, promosso dalla Scuola nazionale del patrimonio e delle attività culturali, nell’ambito di Dicolab – Cultura al digitale, il progetto intende svolgere ricerche integrate tra patrimoni differenti (fotografie, stampe, manoscritti, oggetti). A partire dalla interoperabilità dei dati, l’obiettivo è la realizzazione di un modello di archivio iconografico di risorse di varia tipologia consultabile in modo trasversale con un’interfaccia di ricerca per l’accesso alla teca digitale del Museo Galileo tramite parole chiave controllate nel Thesaurus della Biblioteca nazionale centrale di Firenze per creare collegamenti con risorse di altre biblioteche, di archivi e di musei.
L'articolo Parole condivise per esplorare il nostro patrimonio culturale proviene da Biblioteca nazionale centrale di Firenze.
Half-good new Danish Chat Control proposal
Denmark, currently presiding over the EU Council, proposes a major change to the much-criticised EU chat control proposal to search all private chats for suspicious content, even at the cost of destroying secure end-to-end encryption: Instead of mandating the general monitoring of private chats (“detection orders”), the searches would remain voluntary for providers to implement or not, as is the status quo. The presidency circulated a discussion paper with EU country representatives today, aiming to gather countries’ views on the updated (softened) proposal. The previous Chat Control proposal had even lost the support of Denmark’s own government.
“The new approach is a triumph for the digital freedom movement and a major leap forward when it comes to saving our fundamental right to confidentiality of our digital correspondence”, comments Patrick Breyer (Pirate Party), a former Member of the European Parliament and digital freedom fighter. “It would protect secure encryption and thus keep our smartphones safe. However, three fundamental problems remain unsolved:
1) Mass surveillance: Even where voluntarily implemented by communications service providers such as currently Meta, Microsoft or Google, chat control is still totally untargeted and results in indiscriminate mass surveillance of all private messages on these services. According to the EU Commission, about 75% of the millions of private chats, photos and videos leaked every year by the industry’s unreliable chat control algorithms are not criminally relevant and place our intimate communication in unsafe hands where it doesn’t belong. A former judge of the European Court of Justice, Ninon Colneric (p. 34-35), and the European Data Protection Supervisor (par. 11) have warned that this indiscriminate monitoring violates fundamental rights even when implemented at providers’ discretion, and a lawsuit against the practice is already pending in Germany.
The European Parliament proposes a different approach: allowing for court orders mandating the targeted scanning of communications, limited to persons or groups connected to child sexual abuse. The Danish proposal lacks this targeting of suspects.
2) Digital house arrest: According to Article 6, users under 16 would no longer be able to install commonplace apps from app stores to “protect them from grooming”, including messenger apps such as WhatsApp, Snapchat, Telegram or Twitter, social media apps such as Instagram, TikTok or Facebook, games such as FIFA, Minecraft, GTA, Call of Duty, and Roblox, dating apps, video conferencing apps such as Zoom, Skype, and FaceTime. This minimum age would be easy to circumvent and would disempower as well as isolate teens instead of making them stronger.
3) Anonymous communications ban: According to Article 4 (3), users would no longer be able to set up anonymous e-mail or messenger accounts or chat anonymously as they would need to present an ID or their face, making them identifiable and risking data leaks. This would inhibit, for instance, sensitive chats related to sexuality, anonymous media communications with sources (e.g. whistleblowers), and political activity.
All things considered, the new Danish proposal represents major progress in terms of keeping us safe online, but it requires substantially more work. However, the proposal likely already goes too far already for the hardliner majority of EU governments and the EU Commission, whose positions are so extreme that they will rather let down victims altogether than accept a proportionate, court-proof and politically viable approach.”
In a series of experiments, chimpanzees revised their beliefs based on new evidence, shedding light on the evolutionary origins of rational thought.#TheAbstract
Sudan: il satellite racconta ciò che il mondo ignora
Le immagini pubblicate dalla Yale University documentano massacri di massa nella città sudanese di El-Fasher, conquistata dalle Forze di Supporto Rapido (RSF) domenica scorsa al termine di un assedio durato oltre 18 mesi. Pozze di sangue e cumuli di corpi testimoniano l’avvio di un processo sistematico e intenzionale di pulizia etnica delle comunità non arabe.
“Le azioni delle RSF documentate in questo rapporto potrebbero configurare crimini di guerra e crimini contro l’umanità e potrebbero raggiungere il livello di genocidio”, si legge.
Quella che sconvolge il Sudan dall’aprile 2023 non è però una guerra dimenticata. È diventata la più grave catastrofe umanitaria mondiale, con oltre 30 milioni di persone bisognose di assistenza e civili trasformati in bersagli di una violenza indiscriminata.
Oggi si assiste a una nuova escalation genocidiaria. Le condizioni che rendono possibili tragedie come l’eccidio di El-Fasher non sorgono dunque per caso. Sono il risultato del ridimensionamento incessante della diplomazia e della cooperazione internazionale, del cinismo di fronte a gravi violazioni dei diritti umani e del diritto umanitario, e della costante anteposizione del profitto dei mercanti di armi alla costruzione della pace. Da chi, insomma, si trincera dietro il principio per cui il diritto internazionale valga fino ad un certo punto.
Invece, la sicurezza e la pace si costruiscono guardando nella direzione opposta, quella dei diritti fondamentali. Prima di tutto.
L'articolo Sudan: il satellite racconta ciò che il mondo ignora proviene da Possibile.
Su #Sicurnauti è online la sezione sulle minacce digitali più avanzate, dedicata a #studenti e #genitori. Scopri i contenuti su #Unica.
Qui il video ➡ youtube.com/watch?v=9GLq2EyFyx…
Qui l’infografica ➡ unica.istruzione.gov.
Ministero dell'Istruzione
Su #Sicurnauti è online la sezione sulle minacce digitali più avanzate, dedicata a #studenti e #genitori. Scopri i contenuti su #Unica. Qui il video ➡ https://www.youtube.com/watch?v=9GLq2EyFyxM Qui l’infografica ➡ https://unica.istruzione.gov.Telegram
Comitato Genitori Liceo Augusto reshared this.
WeAreFairphone
in reply to Max - Poliverso 🇪🇺🇮🇹 • • •Jeff likes this.
Max - Poliverso 🇪🇺🇮🇹
in reply to WeAreFairphone • — (Firenze) •@WeAreFairphone
Unfortunately, I only have one phone and I can't take a picture of itself. As soon as my son exits from the shower I'll ask him.
I think he could be out around January 😁
Max - Poliverso 🇪🇺🇮🇹
in reply to WeAreFairphone • •@WeAreFairphone
Here they are!
🌼 Dagnabbit, Pascaline! 🌼
in reply to WeAreFairphone • • •@WeAreFairphone
Yes please 😊
@max
thorcik
in reply to Max - Poliverso 🇪🇺🇮🇹 • • •Max - Poliverso 🇪🇺🇮🇹
in reply to thorcik • •@thorcik
The one on FP5 was elm, darker than this. I liked it so much.
Lars Winkler
in reply to Max - Poliverso 🇪🇺🇮🇹 • • •I want this too.
Max - Poliverso 🇪🇺🇮🇹 likes this.
DoomsdaysCW
in reply to Max - Poliverso 🇪🇺🇮🇹 • • •That is beautiful, @max ! Tagging for #SolarPunkSunday!
#FP5 #Fairphone #PhoneCase
Max - Poliverso 🇪🇺🇮🇹
in reply to DoomsdaysCW • •