Salta al contenuto principale



The newly sequenced RNA is 25,000 years older than the previous record-holder, opening a new window into genetic evolution and revealing a surprise about a famous mammoth mummy.#TheAbstract


Scientists Make Genetic Breakthrough with 39,000-Year-Old Mammoth RNA


Welcome back to the Abstract! These are the studies this week that reached back through time, flooded the zone, counted the stars, scored science goals, and topped it all off with a ten-course meal.

First, scientists make a major breakthrough thanks to a very cute mammoth mummy. Then: the climate case for busy beavers; how to reconnect with 3,000 estranged siblings; this is your brain on football; and last, what Queen Elizabeth II had for lunch on February 20, 1957.

As always, for more of my work, check out my book First Contact: The Story of Our Obsession with Aliens, or subscribe to my personal newsletter the BeX Files.

The long afterlife of Yuka the mammoth


Mármol Sánchez, Emilio et al. “Ancient RNA expression profiles from the extinct woolly mammoth.” Cell.

Scientists have sequenced RNA—a key ingredient of life as we know it—from the remains of a mammoth that lived 39,000 years ago during the Pleistocene “Ice Age” period, making it by far the oldest RNA on record.

The previous record holder for oldest RNA was sourced from a puppy that lived in Siberia 14,300 years ago. The new study has now pushed that timeline back by an extraordinary 25,000 years, opening a new window into ancient genetics and revealing a surprise about a famous mammoth mummy called Yuka.

“Ancient DNA has revolutionized the study of extinct and extant organisms that lived up to 2 million years ago, enabling the reconstruction of genomes from multiple extinct species, as well as the ecosystems where they once thrived,” said researchers led by Emilio Mármol Sánchez of the Globe Institute in Copenhagen, who completed the study while at Stockholm University.

“However, current DNA sequencing techniques alone cannot directly provide insights into tissue identity, gene expression dynamics, or transcriptional regulation, as these are encoded in the RNA fraction.”

“Here, we report transcriptional profiles from 10 late Pleistocene woolly mammoths,” the team continued. “One of these, dated to be ∼39,000 years old, yielded sufficient detail to recover…the oldest ancient RNA sequences recorded to date.”

DNA, the double-stranded “blueprint” molecule that stores genetic information, is far sturdier than RNA, which is why it can be traced back for millions of years instead of thousands. Single-stranded RNA, a “messenger” molecule that carries out the orders of DNA, is more fragile and rare in the paleontological record.

In addition to proving that RNA can survive much longer than previously known, the team discovered that Yuka—the mammoth that died 39,000 years ago—has been misgendered for years (yes, I realize gender is a social construct that does not apply to extremely dead mammoths, but mis-sexed just doesn’t have the same ring).

Yuka was originally deemed female according to a 2021 study that observed the “presence of skin folds in the genital area compatible with labia vulvae structures in modern elephants and the absence of male-specific muscle structures.” Mármol Sánchez and his colleagues have now overturned this anatomical judgement by probing the genetic remnants of Yuka’s Y chromosome.

In fact, as I write this on Thursday, November 13—a day before the embargo on this study lifts on Friday—Yuka is still listed as female on Wikipedia.

Just a day until you can live your truth, buddy.

In other news…

Leave it to beavers


Burgher, Jesse A. S. et al. “Beaver-related restoration and freshwater climate resilience across western North America.” Restoration Ecology.

Every era has a champion; in our warming world, eager beavers may rise to claim this lofty title.

These enterprising rodents are textbook “ecosystem engineers” that reshape environments with sturdy dams that create biodiverse havens that are resistant to climate change. To better assess the role of beavers in the climate crisis, researchers reviewed the reported behavioral beaver-related restoration (BRR) projects across North America.

“Climate change is projected to impact streamflow patterns in western North America, reducing aquatic habitat quantity and quality and harming native species, but BRR has the potential to ameliorate some of these impacts,” said researchers led by Jesse A. S. Burgher of Washington State University.

The team reports “substantial evidence that BRR increases climate resiliency…by reducing summer water temperatures, increasing water storage, and enhancing floodplain connectivity” while also creating “fire-resistant habitat patches.”

So go forth and get busy, beavers! May we survive this crisis in part through the skin of your teeth.

One big happy stellar family


Boyle, Andrew W. et al. “Lost Sisters Found: TESS and Gaia Reveal a Dissolving Pleiades Complex.” The Astrophysical Journal.

Visible from both the Northern and Southern Hemispheres, the Pleiades is the most widely recognized and culturally significant star cluster in the night sky. While this asterism is defined by a handful of especially radiant stars, known as the Seven Sisters, scientists have now tracked down thousands of other stellar siblings born from the same clutch scattered across some 2,000 light years.
Wide-field shot of Pleiades. Image Antonio Ferretti & Attilio Bruzzone
“We find that the Pleiades constitutes the bound core of a much larger, coeval structure” and “we refer to this structure as the Greater Pleiades Complex,” said researchers led by Andrew W. Boyle of the University of North Carolina at Chapel Hill. “On the basis of uniform ages, coherent space velocities, detailed elemental abundances, and traceback histories, we conclude that most stars in this complex originated from the same giant molecular cloud.”

The work “further cements the Pleiades as a cornerstone of stellar astrophysics” and adds new allure to a cluster that first exploded into the skies during the Cretaceous age. (For more on the Pleiades, check out this piece I wrote earlier this year about the deep roots of its lore).

Getting inside your head(er)


Zamorano, Francisco et al. “Brain Mechanisms across the Spectrum of Engagement in Football Fans: A Functional Neuroimaging Study.” Radiology.

Scientists have peered into a place I would never dare to visit—the minds of football fans during high-stakes plays. To tap into the neural side of fanaticism, researchers enlisted 60 healthy male fans from the ages of 20 to 45 to witness dozens of goal sequences from matches involving their favorite teams, rival teams, and “neutral” teams while their brains were scanned by an fMRI machine.

The participants were rated according to a “Football Supporters Fanaticism Scale (FSFS)” with criteria like “violent thought and/or action tendencies” and “institutional belonging and/or identification.” The scale divided the group up into 38 casual spectators, 19 committed fans, and four deranged fanatics (adjectives are mine for flourish).
Rendering of the negative effect of significant defeat. Image: Radiological Society of North America (RSNA)
“Our key findings revealed that scoring against rivals activated the reward system…while conceding to rivals triggered the mentalization network and inhibited the dorsal anterior cingulate cortex (dACC)”—a region responsible for cognitive control and decision-making—said researchers led by Francisco Zamorano of the Universidad San Sebastián in Chile. “Higher Football Supporters Fanaticism Scale scores correlated with reduced dACC activation during defeats, suggesting impaired emotional regulation in highly engaged fans.”

In other words, it is now scientifically confirmed that football fanatics are Messi bitches who love drama.

Diplomacy served up fresh


Cabral, Óscar et al “Power for dinner. Culinary diplomacy and geopolitical aspects in Portuguese diplomatic tables (1910-2023).”

We’ll close, as all things should, with a century of fine Portuguese dining. In yet another edition of “yes, this can be a job,” researchers collected 457 menus served at various diplomatic meals in Portugal from 1910 to 2023 to probe “how Portuguese gastronomic culture has been leveraged as a culinary diplomacy and geopolitical rapprochement strategy.”

As a lover of both food and geopolitical bureaucracy, this study really hit the spot. Highlights include a 1957 “regional lunch” for Queen Elizabeth II that aimed to channel “Portugality” through dishes like lobster and fruit tarts from the cities of Peniche and Alcobaça. The study is also filled with amazing asides like “the inclusion of imperial ice cream in the European Free Trade Association official luncheon (ID45, 1960) seems to transmit a sense of geopolitical greatness and vast governing capacity.” Ice cream just tastes so much better when it’s a symbol of international power.
Menu of the “Luncheon in honour of her Majesty Queen Elizabeth II and his Royal Highness the Duke of Edinburgh” held in Alcobaça (Portugal) on February 20th, 1957. Image: Cabral et al., 2025.
The team also unearthed a possible faux pas: Indian president Ramaswamy Venkataraman, a vegetarian who was raised Hindu, was served roast beef in 1990. In a footnote, Cabral and his colleagues concluded that “further investigation is deemed necessary to understand the context of ‘roast beef’ service to the Indian President in 1990.” Talk about juicy gossip!

Thanks for reading! See you next week.





Quasi dieci anni fa, Julian era lì e reggeva il leggio a Papa Francesco. Era il 18 dicembre e si apriva la porta santa all'ostello della Caritas di Roma, in via Marsala, nel Giubileo straordinario della Misericordia.


ma è possibile che la seconda pagina di qualsiasi articolo pubblicato su adnkronos non sia dico composta da notizie minori, pubblicità, cose poco serie, ma 100% truffoni, fake... è normale? se tolgo lo spam bloocker sul sito è un delirio ridicolo...


Tutti gli errori che oscurano il caso Trentini


@Giornalismo e disordine informativo
articolo21.org/2025/11/tutti-g…
E’ passato esattamente un anno da quando il cooperante veneziano Alberto Trentini si trova nelle carceri del Venezuela. Accusato di cosa? Nessuno lo sa perché le autorità hanno ritenuto di non comunicarlo né alla famiglia, né alla



The Value of a Worked Example


I was looking over the week’s posts on Hackaday – it’s part of my job after all – and this gem caught my eye: a post about how to make your own RP2040 development board from scratch. And I’ll admit that my first thought was “why would you ever want to do that?” (Not a very Hackaday-appropriate question, honestly.) The end result will certainly cost more than just buying a Pi Pico off the shelf!

Then it hit me: this isn’t a project per se, but rather [Kai] was using it as an test run to learn the PCB-production toolchain. And for that, replicating a Pico board is perfect, because the schematics are easily available. While I definitely think that a project like this is a bit complicated for a first PCB project – I’d recommend making something fun like an SAO – the advantage of making something slightly more involved is that you run into all of the accompanying problems learning experiences. What a marvelous post-complete-beginner finger exercise!

And then it hit me again. [Kai]’s documentation of everything learned during the project was absolutely brilliant. It’s part KiCAD tutorial, part journal about all the hurdles of getting a PCB made, and just chock-full of helpful tips along the way. The quality of the write-up turns it from being just a personal project into something that can help other people who are in exactly the same boat, and I’m guessing that’s a number of you out there.

In the end, this was a perfect Hackaday project. Yes, it was “too simple” for those who have made their 30th PCB design. (Although I’d bet you could still pick up a KiCAD tip or two.) And yes, it doesn’t make economic sense to replicate mass-market devices in one-off. And of course, it doesn’t need that fun art on the board either. But wrap all these up together, and you get a superbly documented guide to a useful project that would walk you through 95% of what you’ll need to make more elaborate projects later on. Superb!

Surely you do “finger exercises” too. Why not write them up, and share the learning? And send them our way – we know just the audience who will want to read it.

This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!


hackaday.com/2025/11/15/the-va…




Il Master in Giornalismo della Lumsa premiato all’EIT Food Italy 2025

BOLOGNA – Martedì 11 novembre 2025 si è tenuta la Cerimonia della VI Edizione del Premio di Giornalismo Agroalimentare promosso da EIT Food e organizzato in Italia dal Future Food…
L'articolo Il Master in Giornalismo della Lumsa premiato all’EIT Food Italy 2025 su Lumsanews.


Arriva Kraken: il nuovo ransomware che valuta l’ambiente per infliggere il massimo danno


I ricercatori di Cisco Talos hanno rilevato un’ondata attiva di attacchi che utilizzano un nuovo ransomware chiamato Kraken. Il gruppo ha iniziato a operare nel febbraio 2025 e utilizza metodi di doppia estorsione , senza prendere di mira settori specifici. Tra le vittime figurano aziende di Stati Uniti, Regno Unito, Canada, Danimarca, Panama e Kuwait.

Kraken infetta i sistemi Windows, Linux e VMware ESXi , distribuendo versioni separate del ransomware per ciascun sistema. Il programma utilizza l’estensione .zpsc e lascia una nota, “readme_you_ws_hacked.txt“, minacciando di pubblicare i dati sul suo sito di fuga di notizie. In un caso, gli aggressori hanno chiesto un riscatto di circa 1 milione di dollari in Bitcoin.

In un attacco, gli aggressori hanno sfruttato una vulnerabilità SMB per ottenere l’accesso iniziale, quindi hanno preso piede nel sistema utilizzando lo strumento di tunneling di Cloudflare e hanno utilizzato l’utility SSHFS per rubare dati. Dopo aver ottenuto i privilegi, si sono spostati sulla rete tramite RDP e hanno distribuito ransomware su altre macchine.

Kraken funziona con una varietà di parametri, tra cui crittografia completa o parziale, selezione della dimensione dei blocchi, ritardo di esecuzione e test delle prestazioni. Prima della crittografia, il programma valuta la potenza del sistema e seleziona la modalità più efficiente, aiutando a infliggere il massimo danno senza causare sovraccarico o sospetti.

Su Windows, Kraken è implementato come un’applicazione C++ a 32 bit, possibilmente impacchettata in Go. Disattiva i reindirizzamenti del file system di WoW64, ottiene privilegi di debug, interrompe i servizi di backup, elimina i punti di ripristino e svuota il Cestino. Rimangono accessibili solo le directory che consentono alla vittima di contattare l’operatore.

Il ransomware attacca simultaneamente database SQL, unità locali, condivisioni di rete e macchine virtuali Hyper-V, utilizzando comandi PowerShell per arrestare le VM e ottenere i percorsi al loro storage. Evita le cartelle di sistema e i file eseguibili per preservare la funzionalità del sistema operativo.

La versione Linux/ESXi è scritta in C++ e utilizza crosstool-NG. Il programma rileva innanzitutto il tipo di sistema, adattando il suo comportamento a ESXi, Nutanix, Ubuntu o Synology. Negli ambienti ESXi, arresta le macchine virtuali prima della crittografia. Utilizza inoltre meccanismi di analisi di bypass: modalità demone, ignorando i segnali SIGCHLD e SIGHUP e, al termine della crittografia, esegue uno script di pulizia che elimina i log, la cronologia della shell e il binario stesso.

Kraken è attivo sul darkweb. Sul suo sito web, il gruppo ha annunciato la creazione di un forum underground, “The Last Haven Board“, che si propone come piattaforma anonima per la comunità dei criminali informatici. Secondo i moderatori, ex membri di HelloKitty e il gruppo WeaCorp, specializzato nell’acquisto di exploit, hanno aderito al progetto. Secondo Talos, HelloKitty è stata fonte di ispirazione per Kraken: entrambi i gruppi utilizzano nomi identici per le richieste di riscatto e immagini del blog.

Kraken è uno dei programmi ransomware tecnologicamente più avanzati oggi disponibili, in grado di valutare le prestazioni del sistema prima di attaccare, di adattarsi a diverse piattaforme e di impiegare sofisticate tecniche di occultamento. Oltre alla sofisticata architettura del ransomware, il gruppo è attivo sul darkweb, promuovendo la sua piattaforma e ricevendo il supporto di noti criminali informatici. Data la sua portata e velocità di sviluppo, Kraken potrebbe diventare una delle principali minacce per le infrastrutture aziendali nel prossimo futuro.

L'articolo Arriva Kraken: il nuovo ransomware che valuta l’ambiente per infliggere il massimo danno proviene da Red Hot Cyber.

Gazzetta del Cadavere reshared this.



eVTOL for Everyone


While most of the world’s venture capital is off chasing anything with “AI” in the name in what many think looks increasingly like an inflated spherical film of soap molecules, in aviation all the hot money is betting on eVTOL: electric vertical take off and landing.

What if you want to get in on the eVTOL game but don’t have (or want) billionaire backing? Long-time contributor [spiritplumber] demonstrates how to do it on the cheap, with a low-cost quadcopter and a foam wing called Lift5.

Most eVTOL isn’t just quadcopters, after all — multirotors are great for playing with in the back yard, but their thrust-based lift makes for short range, and the engine-out options are all bad. Add a wing, and you can get that sweet, sweet dynamic lift. Add an extra, forward facing motor, and you can get thrust in the direction you need it most. That’s what [spiritplumber] is doing here: strapping a foam wing to a cheap quadcopter. Specifically, his custom frame for an Eiele F120 drone kit.You can see it in action in the demo video embedded below.

The wing and its forward thrust motor are equipped with its own speed controller, so the concept should be adaptable to just about any little drone. Quadcopter flight computers are mostly going to be able to compensate for the added lift and thrust automatically, which is neat, considering that these forces would require some bizarre headwind/updraft very unlikely to be found in nature.

Now the wing does add a lot of drag during the lift phase, to be sure, so [spiritplumber] is working on folding or tilting it out of the way, but that version is apparently inordinately fond of trees. Once the control issues are worked out you’ll likely see it on his site and YouTube channel Robots Everywhere.

[spiritplumber] has been contributing hacks here at least since 2009, when he showed us how to make a Macbook right click.

youtube.com/embed/VPGdzh6Qtys?…


hackaday.com/2025/11/15/evtol-…



“Con le vostre opere, voi dialogate con chi cerca leggerezza, ma anche con chi porta dentro il cuore un’inquietudine, una domanda di senso, di giustizia, di bellezza”.


Tutti gli errori che oscurano il caso Trentini


@Giornalismo e disordine informativo
articolo21.org/2025/11/tutti-g…
E’ passato esattamente un anno da quando il cooperante veneziano Alberto Trentini si trova nelle carceri del Venezuela. Accusato di cosa? Nessuno lo sa perché le autorità hanno ritenuto di non comunicarlo né alla famiglia, né alla




Il Master in Giornalismo della Lumsa premiato all’EIT Food Italy 2025

BOLOGNA – Martedì 11 novembre 2025 si è tenuta la Cerimonia della VI Edizione del Premio di Giornalismo Agroalimentare promosso da EIT Food e organizzato in Italia dal Future Food…
L'articolo Il Master in Giornalismo della Lumsa premiato all’EIT Food Italy 2025 su Lumsanews.


Vulnerabilità critica in FortiWeb: Fortinet e CISA consigliano aggiornamenti urgenti


Fortinet ha confermato la scoperta di una vulnerabilità critica (CWE-23, path traversal vulnerability) nei dispositivi FortiWeb, identificata con il codice CVE-2025-64446 e registrata come IR Number FG-IR-25-910.

La falla, pubblicata il 14 novembre 2025, interessa principalmente l’interfaccia di gestione GUI e permette a un attaccante non autenticato di eseguire comandi amministrativi tramite richieste HTTP o HTTPS manipolate. La gravità della vulnerabilità è classificata come critica, con un punteggio CVSSv3 di 9.1, e il rischio principale riguarda il controllo degli accessi inadeguato, che potrebbe portare a compromissioni severe dei sistemi.

Secondo Fortinet, la vulnerabilità è già stata sfruttata in contesti reali, aumentando l’urgenza di adottare misure correttive. L’accesso non autorizzato ai dispositivi FortiWeb potrebbe consentire agli attaccanti di ottenere pieno controllo amministrativo, con potenziali conseguenze gravi sulla sicurezza delle reti aziendali.

Le versioni FortiWeb vulnerabili e gli aggiornamenti consigliati sono:

Come misura temporanea, Fortinet consiglia di disabilitare l’accesso HTTP e HTTPS sulle interfacce esposte a Internet. Se l’accesso HTTP/HTTPS è limitato a reti interne, come previsto dalle best practice di sicurezza, il rischio di sfruttamento della vulnerabilità risulta notevolmente ridotto. Questa soluzione permette di mitigare temporaneamente la minaccia fino all’installazione degli aggiornamenti correttivi.

Dopo l’aggiornamento, gli amministratori di sistema dovrebbero esaminare attentamente la configurazione dei dispositivi e analizzare i log per identificare eventuali modifiche non autorizzate o la creazione di account amministrativi sospetti. Queste operazioni di audit sono fondamentali per garantire che eventuali tentativi di compromissione precedenti vengano rilevati e corretti.

Fortinet ha inoltre reso disponibili i pacchetti di aggiornamento nei formati CVRF e CSAF per una gestione strutturata della vulnerabilità. L’azienda invita tutti i clienti a intervenire tempestivamente, data la gravità critica della falla, la sua presenza già in scenari di sfruttamento reale e l’inserimento nel catalogo CISA KEV.

Rischio elevato delle interfacce di amministrazione esposte


Non è consigliabile rendere le interfacce di amministrazione di dispositivi come FortiWeb accessibili su Internet. Anche con aggiornamenti disponibili o sistemi di autenticazione implementati, il rischio rimane elevato: una patch potrebbe non essere ancora applicata, oppure l’autenticazione potrebbe presentare vulnerabilità.

Esporre la GUI pubblicamente espone l’intera azienda a possibili attacchi, inclusi quelli automatizzati, rendendo il sistema vulnerabile a compromissioni critiche. La regola fondamentale per la sicurezza dei dispositivi di rete è che l’accesso amministrativo dovrebbe essere sempre limitato a reti interne sicure e mai reso direttamente pubblico.

Riduci l’esposizione: questa è la chiave del successo.

L'articolo Vulnerabilità critica in FortiWeb: Fortinet e CISA consigliano aggiornamenti urgenti proviene da Red Hot Cyber.




La Giornata Internazionale contro il traffico illecito di beni culturali


Il 14 novembre del 1970 venne elaborata a Parigi la Convenzione universalmente riconosciuta come il primo strumento legislativo sulle misure da adottare per interdire e impedire gli illeciti relativi all’importazione, all’esportazione e al trasferimento di proprietà dei beni culturali.

Nel 2020, a distanza di 50 anni, l’UNESCO indisse, in ricordo di quella data, la Giornata Internazionale contro il traffico illecito di beni culturali col fine di sensibilizzare l’opinione pubblica su un tema ancora oggi di estrema attualità,

In seno alla Giornata Internazionale, The Journal of Cultural Heritage Crime, La Sapienza Università di Roma e Art Crime Project APS hanno organizzato il Convegno di Studi Database e archivi per il contrasto ai crimini contro il patrimonio culturale. L’iniziativa è giunta al terzo appuntamento, dopo aver dato voce nelle precedenti edizioni alle principali istituzioni preposte alla tutela e alla ricerca accademica impegnate, ognuna per le proprie finalità, al contrasto dei fenomeni illeciti contro il patrimonio culturale e, successivamente, ai musei italiani quali presidi impegnati nel quotidiano nella promozione di una cultura della legalità.

Nella giornata presso Sapienza Università di Roma e’ stata la volta dell’incontro tra le istituzioni nazionali ed internazionali impegnate contro il traffico illecito dei beni culturali, gli scavi clandestini e i rischi a cui sono soggetti i luoghi della cultura e la dolorosa dispersione del patrimonio archeologico e culturale, in particolare l’interesse era sui database e gli archivi creati per supportare il lavoro di contrasto al traffico illecito ed ai crimini contro il patrimonio. All’azione fondamentale dei corpi di polizia dedicati alla lotta a tutte le azioni illecite contro il patrimonio, in primis i Carabinieri per la tutela del Patrimonio Culturale, si affianca l’attività delle più importanti organizzazioni internazionali, istituzioni universitarie e centri di ricerca che interverranno illustrando i progetti in corso, aventi come oggetto lo studio scientifico del patrimonio disperso, i materiali provenienti da sequestro, la gestione dei depositi, gli studi sulla provenienza e sull’autenticità dei manufatti che entrano nelle collezioni museali.

Nel corso della giornata e’ stato conferito il Premio ‘Paolo Giorgio Ferri‘, alla sua prima edizione, istituito in memoria del magistrato che ha dedicato la propria vita professionale alla tutela del patrimonio culturale e al contrasto del traffico illecito di beni culturali. Il riconoscimento nasce con l’intento di onorare, con cadenza annuale, personalità che si siano distinte per l’impegno, la competenza e la visione nel campo della protezione dei beni culturali. La scelta di intitolarlo a Paolo Giorgio Ferri, figura centrale nelle politiche italiane di recupero e restituzione, ha voluto ribadire il valore etico e giuridico del suo contributo, che ha ridefinito un modello di cooperazione tra magistratura, forze di polizia e istituzioni museali a livello internazionale. Il premio assegnato in questa occasione rappresenta il simbolo di una continuità ideale tra la memoria e l’attualità del contrasto ai crimini contro il patrimonio.

La Giornata del 14 novembre come un momento di incontro e di scambio di buone pratiche tra tutti gli attori coinvolti nella lotta alla cultura dell’illegalità e del crimine contro il patrimonio, ma anche di riflessione sulle modalità di narrazione e sensibilizzazione dei pubblici verso una sempre più attenta e collaborativa cultura della legalità.

#carabinieriTPC
#ArmadeiCarabinieri
#TUTELAPATRIMONIOCULTURALE

@Attualità, Geopolitica e Satira

fabrizio reshared this.



Convocazione Assemblea dei Genitori del Liceo Augusto per il giorno venerdì 21 novembre alle ore 17

In base

  • all'art. 5, Parte Seconda del Regolamento di Istituto
  • all'art. 5 del Regolamento del Comitato dei Genitori,
  • al consenso accordato alla convocazione da parte della maggioranza dei rappresentanti di classe membri dell'Assemblea dei Rappresentanti
  • alle necessità di modificare la data inizialmente stabilita dal Comitato dei Genitori, a causa delle esigenze logistiche della Scuola
  • all'esito dell'Assemblea dei Rappresentanti tenutasi il 13 novembre 2025 che ha dato mandato al Presidente di individuare una data sulla base delle disponibilità del maggior numero e alla maggior rappresentanza da parte dei genitori candidati come consiglieri di Istituto alle elezioni del 23 e 24 novembre
  • alla risposta positiva di almeno due terzi dei candidati in ciascuna delle due liste concorrenti

il Presidente del Comitato dei Genitori

CONVOCA L'ASSEMBLEA DEI GENITORI DEL LICEO AUGUSTO PER IL GIORNO VENERDÌ 21 NOVEMBRE ALLE ORE 17

Trattandosi di Assemblea on line organizzata con strumenti e risorse del Comitato dei Genitori e non essendoci bisogno dell'autorizzazione della Scuola, non è necessario proporre due date di convocazione alla dirigenza scolastica.

L'Assemblea si terrà in videoconferenza con accesso tramite link che sarà inoltrato almeno mezz'ora prima dell'assemblea tramite:
- la presente mailing list
- l'account social del Comitato
- la bacheca delle attività del Comitato

L'ordine del giorno è il seguente:

1) Approvazione del regolamento dell'Assemblea e dell'ordine del giorno (il regolamento verrà inviato nei prossimi giorni)
2) Presentazione delle due liste di candidati della componente genitori per le elezioni per il Consiglio di Istituto e sessione di domande e risposte
3) Considerazioni relative alla rappresentanza dei genitori e raccolta delle istanze dei genitori
4) Varie ed eventuali

Fino alle 24 ore precedenti l'assemblea, tutti i genitori e tutori degli studenti del Liceo Augusto potranno richiedere, rispondendo a questa email, l'aggiunta di punti all'ordine del giorno nella sezione Varie ed Eventuali.
In forza dell'art. 5 del Regolamento di Istituto, all'assemblea di istituto possono partecipare con diritto di parola il Dirigente scolastico e i docenti dell'istituto; per ragioni organizzative, costoro potranno richiedere il link della riunione prendendo contatto con la presidenza del Comitato entro le 12 ore precedenti.



If It Ain’t Broke… Add Something to It


Given that we live in the proverbial glass house, we can’t throw stones at [ellis.codes] for modifying a perfectly fine Vornado fan. He’d picked that fan in the first place because, unlike most fans, it had a DC motor. Of course, DC motors are easier to control with a microcontroller, and next thing you know, it was sporting an ESP32 and a WiFi interface.

The original fan was surprisingly sparse inside. A power supply, of course, and just a tiny PCB for a speed control. Oddly, it looks like the speed control was just a potentiometer and a 24 V supply. It wasn’t clear if the “motor” had some circuitry in it to do PWM control or not. That seems likely, though.

Regardless, the project opted for a digital pot IC to maintain compatibility. One nice thing about the modification is that it replaces the existing board with the same connectors. So if you wanted to revert the fan to normal, you simply have to swap the boards back.

Now the fan talks to home automation software. Luckily, there’s still nothing wrong with it. We love seeing bespoke ESPHome projects. Even if your fan has WiFi, you might not like it communicating with Big Brother.


hackaday.com/2025/11/15/if-it-…





La rinascita americana sui semiconduttori tra Tsmc e Intel

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Mentre Tsmc agisce come capo-filiera della parte produttiva dei semiconduttori dell’intelligenza artificiale, Intel continua a leccarsi le ferite. L'analisi di Aresu.




Come misurare i (reali) progressi dell’intelligenza artificiale? Report Economist

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Un gruppo di esperti sta valutando con dati e previsioni verificabili l’effettiva evoluzione dell’intelligenza artificiale oltre le promesse delle grandi aziende. I primi risultati





Marion County Record settlement: A step toward accountability


Dear Friend of Press Freedom,

Rümeysa Öztürk has been facing deportation for 234 days for co-writing an op-ed the government didn’t like. As we’ll discuss during an online panel next Tuesday, the government hasn’t stopped targeting journalists for removal. Read on for news from Kansas, Ohio, and more.

Kansas county pays $3M for forgetting the First Amendment


Press freedom just scored a $3 million win in Kansas. The county that participated in an illegal raid on the Marion County Record in 2023 is cutting big checks to journalists and a city councilor to settle their lawsuits.

As part of the settlement, the Marion County Sheriff’s Office also made a statement of “regret” for the raid, saying, “This likely would not have happened if established law had been reviewed and applied prior to the execution of the warrants.”

Ya think? FPF Senior Advocacy Adviser Caitlin Vogus broke down the flashing red lights any judge or cop should heed before storming a newsroom. Read her article here. And check out our March interview with Record publisher Eric Meyer.

No, journalists don’t need permission to cover immigration courts


Last month, we wrote to the Hyattsville immigration court in Maryland to express our alarm over a report that two journalists from Capital News Service had been expelled for not seeking express permission from the federal government to cover immigration proceedings.

That expulsion was contrary not only to the Constitution but also to the Executive Office of Immigration Review’s own guidance. But we noticed another problem with their fact sheet. It said reporters “must” check in upon arriving at immigration court. We’d been hearing anecdotes for some time about journalists being asked to “check in” at lobbies of immigration courts in other parts of the country. The fact sheet confirmed it.

In response, EOIR clarified that journalists are not required to either coordinate visits with the government in advance or check in upon arrival. And it issued an amended fact sheet to remove any doubt. We posted the fact sheet and email exchange on our site so any reporters given wrong information can have them handy. Read more here.

Secrecy and the midterms


The midterm elections are a year away, and it is essential to ensure that they are free and fair. Transparency is key, specifically surrounding the Department of Homeland Security’s election integrity unit and the Justice Department’s attempts to access voter data and equipment.

DHS’s election integrity unit is particularly secretive. For example, President Donald Trump appointed prominent election denier Heather Honey to lead the effort, but very little is known about what she’s doing with her newfound power. FPF’s Daniel Ellsberg Chair on Government Secrecy Lauren Harper has more about our efforts to hold the unit accountable. Subscribe to The Classifieds for more secrecy news.

Charges dropped against Cincinnati journalist


Charges have finally been dropped against CityBeat reporter Madeline Fening, who was arrested while covering a protest at the Roebling Bridge in northern Kentucky in July. Congratulations to the American Civil Liberties Union of Kentucky and their legal partners on the important win.

We led two letters in support of Fening and CityBeat intern Lucas Griffith. After the first, felony charges against the two were dropped. The second led prosecutors to admit to a reporter that they’d offered to drop charges in exchange for the journalists waiving their right to sue — a likely violation of both the Constitution and attorney ethics rules.

Now, both cases are over, but Griffith was found guilty of failure to disperse and fined $50. That may not sound like much, but the constitutional violation is still significant – journalists are not required to disperse along with protesters because they need to be free to cover the aftermath of protests. Read CityBeat’s coverage here.

What we’re reading


Trump vs. the BBC: What hurdles might the president’s legal argument face? (BBC). Trump “doesn’t care” if he wins the lawsuits he’s filed against newsrooms he doesn’t like, FPF’’sbsky.app/profile/did:plc:sabyz…Advocacy Director Seth Stern told BBC. “The point is to intimidate and punish those he views as critical (of) him.”

When reporting is a crime (Inquest). “Prison journalism should not be illegal. It should not be starved, stifled, or silenced. ... laws need to change.” Readbsky.app/profile/did:plc:yvl5j…Inquest’s article featuring FPF columnist Jeremy Busby’s account of how his own journalism, and that of outside reporters wanting to tell his story, is stifled by prison authorities. And watch our video featuring journalist Daniel Moritz-Rabson discussing the guide to reporting on prisons that he wrote for FPF.

The FCC’s news distortion policy should be rescinded (Protect Democracy). Thanks to our friends atbsky.app/profile/did:plc:4fvbd…Protect Democracy for furthering the fight against Brendan Carr’s censorial FCC. Carr’s selective enforcement of the policy to characterize any coverage Trump doesn’t like as “distortion” shows why the policy shouldn’t exist in the first place.

Larry Wilson: Stop shooting at the press while we do our jobs (Los Angeles Daily News). “Cops are banned from shooting non-violent people with deadly projectiles — whether they’re protesters or journalists. Because it’s illegal,” said First Amendment lawyer Susan Seager.

I tried to deliver aid to Gaza. Israel kidnapped and tortured me (The Nation). Journalist and human rights lawyer Thomas Becker writes about his treatment while detained by Israel. Watch our online discussion last week, in partnership with Defending Rights & Dissent, with three U.S. journalists who reported similar experiences after being abducted from aid flotillas.


freedom.press/issues/marion-co…



⚠️Avviso agli utenti di Poliverso.org e poliversity.it⚠️

Stiamo facendo degli interventi di manutenzione e aggiornamento e il server potrebbe non essere disponibile per alcune ore.

Ci scusiamo per il disagio 😅



Un riassunto completo della vicenda chatcontrol raccontata sul sito di Mullvad

Il #chatcontrol è di nuovo in discussione.. Nel Consiglio dell'UE (gli Stati membri), diversi paesi continuano a lavorare su nuove versioni del disegno di legge. L'ultima bozza, presentata nel novembre 2025, è stata presentata con un branding e una semantica diversi, ma comporterebbe sorveglianza di massa , scansione dei dati privati ​​tramite intelligenza artificiale, obbligo di documento d'identità per l'utilizzo dei servizi di messaggistica e, con un testo legislativo vago, il rischio di una scansione obbligatoria (anche per i servizi con crittografia end-to-end) in futuro.

mullvad.net/en/blog/2025/11/14…

@Privacy Pride

in reply to Rosetta_45

@Rosetta_45 sì ma non basta più.
Come ho già scritto da un'altra parte, stavolta hanno passato il limite. Questi hanno riproposto chatcontrol neanche un mese dopo che gli era stato detto chiaro e tondo che non doveva passare. Questi non sono politici, questi sono una recidiva!

Credo che ormai sia giunto il momento di "attaccare".
Dobbiamo fare come gli ucraini che è vero che devono cercare di difendersi disperatamente sulla linea del fronte: loro sanno che al momento devono giocare in difesa e sanno che ai russi non importa il fatto di non vincere tutte le offensive, perché ai russi basta vincerne qualcuna ogni tanto. A questo punto, gli ucraini non resta che far saltare ai russi qualche raffineria, qualche deposito di armi e qualche testa di generale.

Ora mi sembra che sia giunto il momento che i movimenti per la privacy inizino a smettere di giocare in difesa e inizino ad attaccare sul serio questi politici pericolosi, facendo il vuoto intorno a loro, facendo emergere gli scandali che li circondano, sensibilizzando i loro elettorati, spaventando i loro finanziatori e anche producendo materiale satirico che consenta di far emergere quanto sono patetici, incapaci, servi e pericolosi.

Rosetta_45 reshared this.

in reply to Informa Pirata

Esatto,la presidenza Danese deve capire che quando è troppo è troppo se non capisce un semplice "No." da parte di noi cittadini europei allora è il momento di fare sul serio.

Informa Pirata reshared this.



Tech companies are betting big on nuclear energy to meet AIs massive power demands and they're using that AI to speed up the construction of new nuclear power plants.

Tech companies are betting big on nuclear energy to meet AIs massive power demands and theyx27;re using that AI to speed up the construction of new nuclear power plants.#News #nuclear


Power Companies Are Using AI To Build Nuclear Power Plants


Microsoft and nuclear power company Westinghouse Nuclear want to use AI to speed up the construction of new nuclear power plants in the United States. According to a report from think tank AI Now, this push could lead to disaster.

“If these initiatives continue to be pursued, their lack of safety may lead not only to catastrophic nuclear consequences, but also to an irreversible distrust within public perception of nuclear technologies that may inhibit the support of the nuclear sector as part of our global decarbonization efforts in the future,” the report said.
playlist.megaphone.fm?p=TBIEA2…
The construction of a nuclear plant involves a long legal and regulatory process called licensing that’s aimed at minimizing the risks of irradiating the public. Licensing is complicated and expensive but it’s also largely worked and nuclear accidents in the US are uncommon. But AI is driving a demand for energy and new players, mostly tech companies like Microsoft, are entering the nuclear field.

“Licensing is the single biggest bottleneck for getting new projects online,” a slide from a Microsoft presentation about using generative AI to fast track nuclear construction said. “10 years and $100 [million.]”

The presentation, which is archived on the website for the US Nuclear Regulatory Commission (the independent government agency that’s charged with setting standards for reactors and keeping the public safe), detailed how the company would use AI to speed up licensing. In the company’s conception, existing nuclear licensing documents and data about nuclear sites data would be used to train an LLM that’s then used to generate documents to speed up the process.

But the authors of the report from AI Now told 404 Media that they have major concerns about trusting nuclear safety to an LLM. “Nuclear licensing is a process, it’s not a set of documents,” Heidy Khlaaf, the head AI scientist at the AI Now Institute and a co-author of the report, told 404 Media. “Which I think is the first flag in seeing proposals by Microsoft. They don’t understand what it means to have nuclear licensing.”

“Please draft a full Environmental Review for new project with these details,” Microsoft’s presentation imagines as a possible prompt for an AI licensing program. The AI would then send the completed draft to a human for review, who would use Copilot in a Word doc for “review and refinement.” At the end of Microsoft’s imagined process, it would have “Licensing documents created with reduced cost and time.”

The Idaho National Laboratory, a Department of Energy run nuclear lab, is already using Microsoft’s AI to “streamline” nuclear licensing. “INL will generate the engineering and safety analysis reports that are required to be submitted for construction permits and operating licenses for nuclear power plants,” INL said in a press release. Lloyd's Register, a UK-based maritime organization, is doing the same. American power company Westinghouse is marketing its own AI, called bertha, that promises to make the licensing process go from "months to minutes.”

The authors of the AI Now report worry that using AI to speed up the licensing process will bypass safety checks and lead to disaster. “Producing these highly structured licensing documents is not this box taking exercise as implied by these generative AI proposals that we're seeing,” Khlaaf told 404 Media. “The whole point of the lesson in process is to reason and understand the safety of the plant and to also use that process to explore the trade offs between the different approaches, the architectures, the safety designs, and to communicate to a regulator why that plant is safe. So when you use AI, it's not going to support these objectives, because it is not a set of documents or agreements, which I think you know, is kind of the myth that is now being put forward by these proposals.”

Sofia Guerra, Khlaaf’s co-author, agreed. Guerra is a career nuclear safety expert who has advised the U.S. Nuclear Regulatory Commission (NRC) and works with the International Atomic Energy Agency (IAEA) on the safe deployment of AI in nuclear applications. “This is really missing the point of licensing,” Guerra said of the push to use AI. “The licensing process is not perfect. It takes a long time and there’s a lot of iterations. Not everything is perfectly useful and targeted …but I think the process of doing that, in a way, is really the objective.”

Both Guerra and Khlaaf are proponents of nuclear energy, but worry that the proliferation of LLMs, the fast tracking of nuclear licenses, and the AI-driven push to build more plants is dangerous. “Nuclear energy is safe. It is safe, as we use it. But it’s safe because we make it safe and it’s safe because we spend a lot of time doing the licensing and we spend a lot of time learning from the things that go wrong and understanding where it went wrong and we try to address it next time,” Guerra said.

Law is another profession where people have attempted to use AI to streamline the process of writing complicated and involved technical documents. It hasn’t gone well. Lawyers who’ve attempted to write legal briefs have been caught, over and over again, in court. AI-constructed legal arguments cite precedents that do not exist, hallucinate cases, and generally foul up legal proceedings.

Might something similar happen if AI was used in nuclear licensing? “It could be something as simple as software and hardware version control,” Khlaaf said. “Typically in nuclear equipment, the supply chain is incredibly rigorous. Every component, every part, even when it was manufactured is accounted for. Large language models make these really minute mistakes that are hard to track. If you are off in the software version by a letter or a number, that can lead to a misunderstanding of which software version you have, what it entails, the expectation of the behavior of both the software and the hardware and from there, it can cascade into a much larger accident.”

Khlaaf pointed to Three Mile Island as an example of an entirely human-made accident that AI may replicate. The accident was a partial nuclear meltdown of a Pennsylvania reactor in 1979. “What happened is that you had some equipment failure and design flaws, and the operators misunderstood what those were due to a combination of a lack of training…that they did not have the correct indicators in their operating room,” Khlaaf said. “So it was an accident that was caused by a number of relatively minor equipment failures that cascaded. So you can imagine, if something this minor cascades quite easily, and you use a large language model and have a very small mistake in your design.”

In addition to the safety concerns, Khlaaf and Guerra told 404 Media that using sensitive nuclear data to train AI models increases the risk of nuclear proliferation. They pointed out that Microsoft is asking not only for historical NRC data but for real-time and project specific data. “This is a signal that AI providers are asking for nuclear secrets,” Khlaaf said. “To build a nuclear plant there is actually a lot of know-how that is not public knowledge…what’s available publicly versus what’s required to build a plant requires a lot of nuclear secrets that are not in the public domain.”

“This is a signal that AI providers are asking for nuclear secrets. To build a nuclear plant there is actually a lot of know-how that is not public knowledge…what’s available publicly versus what’s required to build a plant requires a lot of nuclear secrets that are not in the public domain.”


Tech companies maintain cloud servers that comply with federal regulations around secrecy and are sold to the US government. Anthropic and the National Nuclear Security Administration traded information across an Amazon Top Secret cloud server during a recent collaboration, and it’s likely that Microsoft and others would do something similar. Microsoft’s presentation on nuclear licensing references its own Azure Government cloud servers and notes that it’s compliant with Department of Energy regulations. 404 Media reached out to both Westinghouse Nuclear and Microsoft for this story. Microsoft declined to comment and Westinghouse did not respond.

“Where is this data going to end up and who is going to have the knowledge?” Guerra told 404 Media.

💡
Do you know anything else about this story? I would love to hear from you. Using a non-work device, you can message me securely on Signal at +1 347 762-9212 or send me an email at matthew@404media.co.

Nuclear is a dual use technology. You can use the knowledge of nuclear reactors to build a power plant or you can use it to build a nuclear weapon. The line between nukes for peace and nukes for war is porous. “The knowledge is analogous," Khlaaf said. “This is why we have very strict export controls, not just for the transfer of nuclear material but nuclear data.”

Proliferation concerns around nuclear energy are real. Fear that a nuclear energy program would become a nuclear weapons program was the justification the Trump administration used to bomb Iran earlier this year. And as part of the rush to produce more nuclear reactors and create infrastructure for AI, the White House has said it will begin selling old weapon-grade plutonium to the private sector for use in nuclear reactors.

Trump’s done a lot to make it easier for companies to build new nuclear reactors and use AI for licensing. The AI Now report pointed to a May 23, 2025 executive order that seeks to overhaul the NRC. The EO called for the NRC to reform its culture, reform its structure, and consult with the Pentagon and the Department of Energy as it navigated changing standards. The goal of the EO is to speed up the construction of reactors and get through the licensing process faster.

A different May 23 executive order made it clear why the White House wants to overhaul the NRC. “Advanced computing infrastructure for artificial intelligence (AI) capabilities and other mission capability resources at military and national security installations and national laboratories demands reliable, high-density power sources that cannot be disrupted by external threats or grid failures,” it said.

At the same time, the Department of Government Efficiency (DOGE) has gutted the NRC. In September, members of the NRC told Congress they were worried they’d be fired if they didn’t approve nuclear reactor designs favored by the administration. “I think on any given day, I could be fired by the administration for reasons unknown,” Bradley Crowell, a commissioner at the NRC said in Congressional testimony. He also warned that DOGE driven staffing cuts would make it impossible to increase the construction of nuclear reactors while maintaining safety standards.

“The executive orders push the AI message. We’re not just seeing this idea of the rollback of nuclear regulation because we’re suddenly very excited about nuclear energy. We’re seeing it being done in service of AI,” Khlaaf said. “When you're looking at this rolling back of Nuclear Regulation and also this monopolization of nuclear energy to explicitly power AI, this raises a lot of serious concerns about whether the risk associated with nuclear facilities, in combination with the sort of these initiatives can be justified if they're not to the benefit of civil energy consumption.”

Matthew Wald, an independent nuclear energy analyst and former New York Times science journalist is more bullish on the use of AI in the nuclear energy field. Like Khlaaf, he also referenced the accident at Three Mile Island. “The tragedy of Three Mile Island was there was a badly designed control room, badly trained operators, and there was a control room indication that was very easy to misunderstand, and they misunderstood it, and it turned out that the same event had begun at another reactor. It was almost identical in Ohio, but that information was never shared, and the guys in Pennsylvania didn't know about it, so they wrecked a reactor,” Wald told 404 Media.

"AI is helpful, but let’s not get messianic about it.”


According to Wald, using AI to consolidate government databases full of nuclear regulatory information could have prevented that. “If you've got AI that can take data from one plant or from a set of plants, and it can arrange and organize that data in a way that's helpful to other plants, that's good news,” he said. “It could be good for safety. It could also just be good for efficiency. And certainly in licensing, it would be more efficient for both the licensee and the regulator if they had a clearer idea of precedent, of relevant other data.”

He also said that the nuclear industry is full of safety-minded engineers who triple check everything. “One of the virtues of people in this business is they are challenging and inquisitive and they want to check things. Whether or not they use computers as a tool, they’re still challenging and inquisitive and want to check things,” he said. “And I think anybody who uses AI unquestionably is asking for trouble, and I think the industry knows that…AI is helpful, but let’s not get messianic about it.”

But Khlaaf and Guerra are worried that the framing of nuclear power as a national security concern and the embrace of AI to speed up construction will setback the embrace of nuclear power. If nuclear isn’t safe, it’s not worth doing. “People seem to have lost sight of why nuclear regulation and safety thresholds exist to begin with. And the reason why nuclear risks, or civilian nuclear risk, were ever justified, was due to the capacity for nuclear power. To provide flexible civilian energy demands at low cost emissions in line with climate targets,” Khlaaf said.

“So when you move away from that…and you pull in the AI arms race into this cost benefit justification for risk proportionality, it leads government to sort of over index on these unproven benefits of AI as a reason to have nuclear risk, which ultimately undermines the risks of ionizing radiation to the general population, and also the increased risk of nuclear proliferation, which happens if you were to use AI like large language models in the licensing process.”





si parla tanto di obsolescenza programmata. ma a me sembra più una ricerca di un colpevole che di un problema strutturale. il problema moderno, almeno in certi segmenti produttivi è una produzione approssimativa e imprecisa. i problemi possono infatti essere vari e andare dalla cattiva progettazione, al montaggio sbagliato, all'uso di materiali o componenti sbagliati. il mondo è pieno di prodotti fatti male. alcuni non sono neppure pensati per l'uso a cui sono rivolti. almeno non pienamente. pure le forme degli oggetti a volte sono scomode durante l'uso. molti partono da buoni progetti ma poi la scelta dei componenti lascia molto a desiderare. a volte sono le rifiniture tradire. il mondo stesso con cui i cavi sono bloccati o fissati può essere un problema, ma riguardare la fase successiva di produzione piuttosto che la fase di progettazione e produzione del primo prototipo. spesso poi manca tutta la fase di test e prove sotto stress. quello che è giusto chiedere come consumatori è una garanzia dei prodotti più prolungati, cosa che potrebbe costringere i produttori a studiare meglio la durata media dei propri prodotti. e in generale a pretendere una qualità minima indipendentemente dalla fascia di prezzo del prodotto. questo è un problema non solo di chi produce ma un più globale problema ci consapevolezza di se stessi, dei propri bisogni, e di cosa abbiamo bisogno. si potrebbe anche prevedere, a livello di leggi, la fornitura di prodotti sostitutivi equivalenti durante i tempi di riparazione. fare filmati dove si parla ossessivamente di obsolescenza programmata, facendo passare per cattivi certi produttori, o peggio facendo passare l'idea che non ci possiamo fare niente perché il mondo è malvagio e tutti i produttori hanno l'unico scopo tanto di fare prodotti che durano poco, l'eterna idea del cattivo e dell'inutile crociata contro il male (quella che nei film finisce sempre bene ma che sappiamo invece finire sempre male nella realtà, sapienza da adulti smaliziati per intenderci) non è utile e non ci porta da nessuna parte. per questo approvo che si parli e discuta della pessima qualità dei prodotti colpevoli di questo, ma non riferimenti specifici all"obsolescenza programmata". trovo che sia una cosa che direbbe un complottista che più che avere capito il problema cerca di creare allarme.

reshared this

in reply to simona

se rooti il telefono puoi mettere la rom che vuoi. ma stanno progressivamente togliendo il root e non interessa a nessuno. come al solito i peggiori nemici di noi stessi siamo solo noi stessi. anche perché in telefono, cambiando via via batteria, è realmente un oggetto indistruttibile, se trattato decentemente. se citi lo smartphone come obsolescenza programmata hai proprio sbagliato oggetto.... se c'è un oggetto che funziona anche sott'acqua è quello.


*Libertà per il Dott. Husam Abu Safiyya*

Ecco alcuni punti chiave sulla sua situazione e le richieste di liberazione:
• Arrestato il 27 dicembre 2024 durante un raid israeliano all’ospedale Kamal Adwan.




Are EU Austerity Cuts Adding To The Inequalities?


Europe stands at perhaps the most difficult crossroads of recent times, a tough call to make between social welfare and stabilizing fiscal balance. On 4 November 2025, the IMF issued a warning, citing the deep fiscal troubles the EU is facing and how the situation is likely to worsen if immediate and more decisive steps are not taken. The rising debt levels, which could double to 140% by 2040, as suggested by the IMF, pose an imminent threat to disturbing the existing fragile balance between revenue and expenditure. Funding various social schemes, including pensions, unemployment benefits, healthcare, and education, has long been a mainstay of government policies across the EU. Now, the IMF calls for a re-evaluation of those spending policies. The message is clear: harsh measures are crucial now to have a better future. Across Europe, governments have already joined the austerity drive. For the last 18 months, the EU has been experimenting with various ideas as part of a strict fiscal policy aimed at restoring the budgetary balance. Below is a list of measures adopted across the EU countries:

  • Raising the statutory retirement age.
  • Freezing or delaying pension indexation.
  • Limiting the duration of unemployment benefits.
  • Reducing public-sector wage growth or hiring.
  • Cutting healthcare and education budgets.
  • Phasing out early-retirement schemes.
  • Increasing consumption or environmental taxes.
  • Reducing energy or transport subsidies.
  • Capping family and housing support payments.
  • Restricting public investment spending.

These measures have either been implemented/approved, or are currently under parliamentary debate. As policymakers adjust the policy machinery to cope with an impending economic peril, implementations are faced with a formidable opposition from the affected groups. In fact, over the last two months, a wave of rising resentment has been evident. Belgium, France, Germany, Italy, and more have all witnessed nationwide strikes, and many more are likely to follow.

Although cutting public spending might seem like a straightforward solution to rectify the current fiscal imbalance from the government’s perspective, the situation is not entirely linear. Cutting public funding, such as pensions, social benefits, or unemployment funds, reduces the disposable income of the impacted groups. Low disposable income means lower consumer demand. With demand spiraling downward, supply needs to be downsized as well, following a fundamental economic principle that matches market demand. As a result, businesses respond with layoffs, further reducing tax revenues and pushing up unemployment levels. In short, economies can face a self-perpetuating cycle that widens inequality and, even worse, triggers an economic recession (something the world witnessed in the 1930s – The Great Depression).

Furthermore, a reduction in expenditure on human infrastructure, whether in health or education, has a long-term negative impact on the economy. The immediate effect could be a robust balance sheet and good fiscal ratios. In the longer run, it weakens the foundation for sustainable growth, something which the EU stands for and identifies with. Decline in human capital, lack of innovation and global competitiveness, brain drain, social inequality, and other issues are a few notable consequences. Excessively rigid austerity measures, in a way, can undermine growth and social cohesion.

The IMF’s warning, therefore, should not be examined in a single dimension. Instead of treating it as a call to cut, it can be perceived as an invitation to rethink how Europe balances its books while safeguarding its people.

The solution lies in achieving a balance:


According to Friedrich Ebert Stiftung’s “Alternative to Austerity”, if fiscal strategies are growth-oriented, rather than simply focusing on cutting expenditure, a balance can be reinstated without impacting the welfare. Budgetary discipline will have to be achieved through the use of a balanced mix of responsible budgeting and investing public funds wisely. Pumping investments into areas such as infrastructure, education, and green technology can help countries build strong and sustainable economies, as well as secure their futures. These investments can help create more jobs, improve skills, and support long-term growth. It also calls for a fairer tax system where the wealthy and large companies contribute more, reducing the pressure on working families.

The problem the EU is facing at this moment goes beyond the budget. The challenge is about protecting fairness and dignity. Financial discipline should always go hand-in-hand with social justice.

The goal should not be to weaken the social support systems people depend on, but to strengthen and make them more sustainable, so that growth and fairness work together, rather than against each other.

Reference Links:

politico.eu/article/police-cla… | archive.ph/pYghC

euronews.com/2025/09/24/french… | archive.ph/JetNb

berlintoday.com/public-sector-… | archive.ph/8ZdCM


european-pirateparty.eu/are-eu…



Oltre il dovuto


@Privacy Pride
Il post completo di Christian Bernieri è sul suo blog: garantepiracy.it/blog/oltre-il…
Che periodo! Settimane molto complicate per chi riveste un ruolo di responsabilità presso gli uffici del Garante Privacy Settimane infernali per i quattro componenti del Collegio. Dopo la magistrale overture eseguita dalla trasmissione Report, l’orchestra dell’informazione sta

Privacy Pride reshared this.




Are EU Austerity Cuts Adding To The Inequalities?


@politics
european-pirateparty.eu/are-eu…

Europe stands at perhaps the most difficult crossroads of recent times, a tough call to make between social welfare and stabilizing fiscal balance.…



Hasbara in crisi: Israele ora investe milioni per rilanciare la sua immagine


@Notizie dall'Italia e dal mondo
Il collasso della strategia comunicativa israeliana dopo due anni di offensiva su Gaza. Arruolati influencer e celebrità arabe per ricostruire un’immagine logorata dal peso delle distruzioni e delle vittime civili
L'articolo Hasbara in crisi: Israele ora



E5, l’Europa si compatta. Aiuti a Kyiv e difesa dalle minacce ibride

@Notizie dall'Italia e dal mondo

La riunione in formato E5 della Difesa a Berlino ha mostrato come il sostegno all’Ucraina e la gestione delle minacce ibride siano diventati il baricentro della cooperazione europea. Italia, Germania, Francia, Polonia e Regno Unito hanno affrontato il nodo della capacità industriale,



Meloni ammette che i centri per migranti in Albania sono stati un flop ma precisa: “La colpa non è la mia”


@Politica interna, europea e internazionale
Costati quasi un miliardo, i centri per migranti costruiti in Albania dopo l’accordo tra il governo Meloni ed Edi Rama sono da circa due anni desolatamente vuoti. Durante il vertice intergovernativo Italia-Albania che si è tenuto a Villa Pamphilj nella