Salta al contenuto principale



Get Statistical About Your Pet With This Cat Tracking Dashboard


Cats can be wonderful companions, but they can also be aloof and boring to hang out with. If you want to get a little more out of the relationship, consider obsessively tracking your cat’s basic statistics with this display from [Matthew Sylvester].

The build is based around the Seeedstudio ReTerminal E1001/E1002 devices—basically an e-paper display with a programmable ESP32-S3 built right in. It’s upon this display that you will see all kinds of feline statistics being logged and graphed. The data itself comes from smart litterboxes, with [Matthew] figuring out how to grab data on weight and litterbox usage via APIs. In particular, he’s got the system working with PetKit gear as well as the Whisker Litter Robot 4. His dashboard can separately track data for four cats and merely needs the right account details to start pulling in data from the relevant cat cloud service.

For [Matthew], the build wasn’t just a bit of fun—it also proved very useful. When one of his cats had a medical issue recently, he was quickly able to pick up that something was wrong and seek the help required. That’s a pretty great result for any homebrew project. It’s unrelated, too, but Gnocci is a great name for a cat, so hats off for that one.

We’ve featured some other fun cat-tracking projects over the years, too. If you’re whipping up your own neat hardware to commune with, entertain, or otherwise interact with your cat, don’t hesitate to let us know on the tipsline.


hackaday.com/2025/12/13/get-st…



fanpage.it/wamily/non-sono-i-v…

la difficoltà generalizzata dirompente che riscontro, che mi fa vedere il genere umano come sempre più incapace di esprimere pensieri complessi (quale che sia l'ambito o lo strumento utilizzato) e composto più da involucri vuoti che persone, deriva forse dal cessato mancato sforzo di dover scrivere lunghi e "tediosi" testi per descrivere le proprie idee e anche le proprie necessità.
la semplificazione e la brevità imposta spesso da ticktock o tutti i social media in generale, e non l'uso del social medio stesso, costituisce secondo me il vero pericolo concreto.

le persone che su social media esprimono solo pensieri semplici, o si astengono, per pigrizia di dover scrivere, poi di persona non mostrano nessun riscatto o risveglio o voglia di stupire con pensieri super-complessi e super-articolati. se ne deduce che la perdita cognitiva non è relativa solo all'ambito limitato dello smarphone/social media ma più generalizzata.



pensare che windows 11 sia tutto sommato accettabile perché tanto esistono tanti modi per aggirare le sue protezioni è ogni giorno più un azzardo...

Rinaldo Giorgetti reshared this.



Su Play2000, la piattaforma streaming di Tv2000 e Radio inBlu2000, lunedì 15 dicembre alle 17 in diretta da piazza San Pietro, in Vaticano, la cerimonia di inaugurazione del Presepe e dell’illuminazione dell’albero di Natale.


“Che cosa cercate? Giovani e senso nel contesto attuale”: è il titolo del seminario, che si svolgerà il 15 dicembre (dalle 10 alle 17), a Roma, promosso congiuntamente dal Servizio nazionale per la Pastorale giovanile (Snpg) e l’Ufficio nazionale per…


Un docufilm indipendente patrocinato dall'Associazione internazionale esorcisti "nasce in Italia e arriva, sorprendentemente, a scalare le classifiche oltreoceano".



non essere vecchi dentro significa continuare a crescere come persone, fare cose nuove, imparare cose nuove, rinnovarsi, non si è "giovani" se si continua a fare e pensare come facevamo a 20 anni ancora a 80 anni... questo lo fai se il fisico te lo consente ma non nega la verità di essere comunque vecchi inside.

Sabrina Web 📎 reshared this.

in reply to simona

non essere vecchi dentro significa forse finirla di dare consigli su come non essere vecchi dentro. poi che male c'è a essere vecchi dentro, ad arrivare alla fine avendo provato tutto quel che c'era da provare, suppergiù, e perciò magari stanchi e pronti a lasciar spazio ad altr*?
in reply to Jones

la volontà di esser sempre giovani è quasi peggio di quella di vivere per sempre, secondo me.
in reply to Jones

"la domenica delle salme/ si sentiva cantare/ quant'è bella giovinezza/ non vogliamo più invecchiare", youtube.com/watch?v=fbyrva6quT…
in reply to Jones

youtube.com/watch?v=9SdZfWUc70… 🙂
in reply to simona

sarebbe bello capire come si integra nel merito della discussione


questa idea che per aumentare la credibilità italiana vada mandata la spazzatura che il potere non vuole in italia in europa o all'onu....

Claus reshared this.



MITRE pubblica la lista delle TOP25 debolezze software più pericolose del 2025


Il MITRE ha reso pubblica la classifica delle 25 più pericolose debolezze software previste per il 2025, secondo i dati raccolti attraverso le vulnerabilità del national Vulnerability Database. Tali vulnerabilità sono state individuate analizzando 39.080 record di Common Vulnerabilities and Exposures (CVE)riportati nell’anno in corso, al fine di segnalare le cause principali.

L’aumento delle minacce informatiche ha elevato l’importanza della classifica annuale, la quale elaborata in base a dati CVE reali, permette una più efficace identificazione e riduzione dei rischi all’interno delle organizzazioni.

Gli aggressori possono assumere il controllo del sistema, sottrarre dati sensibili o compromettere le applicazioni a causa di questi difetti pervasivi, che sono spesso facilmente individuabili e sfruttabili.

La classifica CWE Top 25 può aiutare a:

  • Riduzione delle vulnerabilità : le informazioni sulle cause comuni alla radice forniscono un feedback prezioso per la pianificazione SDLC e architettonica dei fornitori, contribuendo a eliminare intere classi di difetti (ad esempio, sicurezza della memoria, iniezione)
  • Risparmio sui costi : meno vulnerabilità nello sviluppo del prodotto significano meno problemi da gestire dopo la distribuzione, con conseguente risparmio di denaro e risorse
  • Analisi delle tendenze : la comprensione delle tendenze dei dati consente alle organizzazioni di concentrare meglio gli sforzi di sicurezza
  • Informazioni sullo sfruttabilità : alcune debolezze, come l’iniezione di comandi, attirano l’attenzione degli avversari, consentendo di stabilire le priorità del rischio.
  • Fiducia del cliente : la trasparenza nel modo in cui le organizzazioni affrontano queste debolezze dimostra impegno per la sicurezza del prodotto

Le vulnerabilità legate alla sicurezza della memoria, come i buffer overflow, sono ricorrenti, il che sta portando all’adozione di linguaggi più sicuri come Rust. Nello stesso tempo, le applicazioni web devono far fronte a minacce e problemi di autenticazione. Inoltre, le vulnerabilità come Use After Free, rientranti nella categoria KEV, richiedono l’implementazione di un modello di controllo basato sullo zero-trust.

È fondamentale che le organizzazioni esaminino i propri codici in base a questo elenco, incorporino le verifiche CWE nelle loro pipeline di integrazione continua, insistano con i fornitori per garantire la trasparenza e sfruttino i contratti per imporre ai fornitori l’applicazione di standard rigorosi per la scrittura di codice sicuro..

L'articolo MITRE pubblica la lista delle TOP25 debolezze software più pericolose del 2025 proviene da Red Hot Cyber.



software = circuito logico, hardware = circuito fisico


Salute - Medicina: I numeri segreti di Pfizer e sulla pandemia - Antonio Porto Gabriele Segalla Giovanni Trambusti - Il Vaso di Pandora
ivdp.it/articoli/i-numeri-segr…


User Serviceable Parts


Al and I were talking on the podcast about the Home Assistant home automation hub software. In particular, about how devilishly well designed it is for extensibility. It’s designed to be added on to, and that makes all of the difference.
That doesn’t mean that it’s trivial to add your own wacky control or sensor elements to the system, but that it’s relatively straightforward, and that it accommodates you. If your use case isn’t already covered, there is probably good documentation available to help guide you in the right direction, and that’s all a hacker really needs. As evidence for why you might care, take the RTL-HAOS project that we covered this week, which adds nearly arbitrary software-defined radio functionality to your setup.

And contrast this with many commercial systems that are hard to hack on because they are instead focused on making sure that the least-common-denominator user is able to get stuff working without even reading a single page of documentation. They are so focused on making everything that’s in-scope easy that they spend no thought on expansion, or worse they actively prevent it.

Of course, it’s not trivial to make a system that’s both extremely flexible and relatively easy to use. We all know examples where the configuration of even the most basic cases is a nightmare simply because the designer wanted to accommodate everything. Somehow, Home Assistant has managed to walk the fine line in the middle, where it’s easy enough to use that you don’t have to be a wizard, but that you can make it do what you want if you are, and hence it got spontaneous hat-tips from both Al and myself. Food for thought if you’re working on a complex system that’s aimed at the DIY / hacker crowd.

This article is part of the Hackaday.com newsletter, delivered every seven days for each of the last 200+ weeks. It also includes our favorite articles from the last seven days that you can see on the web version of the newsletter. Want this type of article to hit your inbox every Friday morning? You should sign up!


hackaday.com/2025/12/13/user-s…



Il Day-One del Caos di React2Shell! Spie, criminali e cryptominer si contendono i server


Un recente resoconto del gruppo Google Threat Intelligence (GTIG) illustra gli esiti disordinati della diffusione di informazioni, mettendo in luce come gli avversari più esperti abbiano già preso piede all’interno delle reti dei soggetti colpiti.

Una vulnerabilità critica, identificata come CVE-2025-55182, è stata segnalata alla comunità della sicurezza il 3 dicembre 2025, riguardante React Server Components (RSC). Questa falla di sicurezza, con un punteggioCVSS massimo di 10,0, permette a malintenzionati di eseguire codice arbitrario su un server mediante l’invio di una sola richiesta HTTP appositamente strutturata, senza necessità di autenticazione.

Il mondo informatico ha reagito con prontezza. Subito dopo la notizia pubblica, numerosi cluster di minacce sono stati sfruttati diffusamente, come rilevato dal Google Threat Intelligence Group (GTIG), che ha notato attività sia di gruppi di criminali informatici opportunisti fino a presunti operatori di spionaggio.

Poiché React e Next.js sono fondamentali per il web moderno, la superficie di attacco è enorme. “GTIG considera CVE-2025-55182 una vulnerabilità a rischio critico”. L’attività più allarmante identificata nel rapporto proviene da autori di minacce collegate alla Cina, che hanno rapidamente integrato l’exploit nei loro arsenali per distribuire malware specializzati. Il GTIG ha identificato diverse campagne distinte:

  • Tunnelers di UNC6600: questo gruppo è stato visto utilizzare MINOCAT, un sofisticato tunneler. Hanno fatto di tutto per nascondere le proprie tracce, creando directory nascoste come $HOME/.systemd-utils e uccidendo spietatamente i processi legittimi per liberare risorse.
  • C2 “legittimo” (UNC6603): questo autore ha implementato una versione aggiornata della backdoor HISONIC. In un’astuta mossa per mimetizzarsi, HISONIC “utilizza servizi cloud legittimi, come Cloudflare Pages e GitLab, per recuperare la sua configurazione crittografata”.
  • The Masqueraders (UNC6595): Distribuendo un malware denominato ANGRYREBEL.LINUX, questo gruppo ha tentato di eludere il rilevamento “mascherando il malware come il legittimo demone OpenSSH (sshd) all’interno della directory /etc/” e utilizzando tecniche anti-forensi come il timestomping.
  • Vim Impostor (UNC6588): in un’altra ondata di attacchi, gli autori hanno utilizzato l’exploit per scaricare COMPOOD, una backdoor che si camuffava da popolare editor di testo Vim per evitare sospetti.

“GTIG ha identificato campagne distinte che sfruttano questa vulnerabilità per distribuire un tunneler MINOCAT, un downloader SNOWLIGHT, una backdoor HISONIC e una backdoor COMPOOD, nonché miner di criptovalute XMRIG, alcune delle quali si sovrappongono all’attività precedentemente segnalata da Huntress“.

Oltre allo spionaggio, a partire dal 5 dicembre si sono uniti alla mischia anche criminali motivati da interessi finanziari, che hanno utilizzato i miner XMRig per dirottare le risorse del server e generare criptovalute.

Il caos è stato ulteriormente aggravato da un’ondata di disinformazione. Nelle prime ore successive alla divulgazione, Internet è stato inondato di exploit falsi. Un importante repository “che inizialmente sosteneva di essere un exploit funzionale legittimo, ha ora aggiornato il proprio file README per etichettare correttamente le affermazioni iniziali della ricerca come generate dall’intelligenza artificiale e non funzionali”.

L'articolo Il Day-One del Caos di React2Shell! Spie, criminali e cryptominer si contendono i server proviene da Red Hot Cyber.



La Conferenza episcopale argentina “saluta fraternamente la Famiglia salesiana con motivo dei 150 anni del suo arrivo nel nostro Paese, nel quadro dell’Anno giubilare che celebra la Congregazione”. Lo si legge in un messaggio firmato da mons.



Normally, it’s bad news to be next to an exploding star. But ancient supernovae may have aided the formation of our home world—and perhaps Earthlike planets elsewhere.#TheAbstract


Earth-Like Planets Are More Common Than We Thought, Study Says


Welcome back to the Abstract! These are the studies this week that got hosed with star spray, mounted a failed invasion, declined to comment, and achieved previously unknown levels of adorability.

First, a study about how the solar system wasn’t destroyed 4.5 billion years ago (phew!). Then: a human touch on an ancient boat, the duality of posters and lurkers, and an important update on toadlets.

As always, for more of my work, check out my book First Contact: The Story of Our Obsession with Aliensor subscribe to my personal newsletter the BeX Files.

Sink into a warm cosmic-ray bath


Sawada, Ryo et al. “Cosmic-ray bath in a past supernova gives birth to Earth-like planets.” Science Advances.

Earth was cosmically conceived in part by a massive shockwave from a nearby supernova, which seeded our home world and neighboring rocky planets with telltale radioactive signatures, according to a new study.

The solar system’s rocky planets contain short-lived radionuclides (SLRs), which are ancient elements that were likely barfed out from exploding stars. For this reason, scientists have long suspected that stars must’ve detonated next to the gassy disk that gave rise to the solar system. The heat generated from these radioactive elements helped the building blocks of the rocky planets—Mercury, Venus, Earth, and Mars—melt together so they could become whole worlds, which means we owe our existence to these ancient supernovas.

Now, a team has developed a new model to explain how the primordial pyrotechnics didn’t just blow up the nascent solar system. The results suggest that rocky Earth-like worlds may be common in the universe, with potential implications for the search for extraterrestrial life.

“A key question in astronomy is how ubiquitous Earth-like rocky planets are,” said researchers led by Ryo Sawada of the University of Tokyo. “The formation of terrestrial planets in our Solar System was strongly influenced by the radioactive decay heat of SLRs, particularly aluminum-26, likely delivered from nearby supernovae.”

“However, the supernova injection scenario faces an unresolved problem in that existing supernova models could not reproduce both the relative and absolute abundances of SLRs without disrupting the protosolar disk,” an event that “would likely prevent the Solar System formation altogether,” the team added.

In other words, it’s hard to explain how the solar system got its high abundance of SLRs without killing it in the cradle. Sawada and his colleagues propose a solution that involves at least one star exploding about three light years of the disk, sparking a shockwave that created a cosmic-ray “bath.”
Schematic picture of the system assumed in this study. Image: Sawada et al., Sci. Adv. 11, eadx7892
In this “immersion mechanism,” energetic cosmic rays trapped in the bath triggered SLR-producing reactions directly within the disk. This contrasts with the hypothesis that the SLRs were largely injected and then mixed up in the disk through some unknown process. This new solution can account both for the high abundance of certain SLRs, like aluminum-26, and the fact that the solar system was not destroyed, as evidenced by its apparent continued existence.

“Our results suggest that Earth-like, water-poor rocky planets may be more prevalent in the

Galaxy than previously thought,” the team said, noting that many disks are rocked by similar supernova-shockwaves. “This challenges previous interpretations that classified the Solar System as an outlier with a particularly high [aluminum-26] abundance.”

In addition to offering a new hypothesis for an old astronomical problem, the study gets bonus points for its extremely poetic title: “Cosmic-ray bath in a past supernova gives birth to Earth-like planets.” If you say this enchanted phrase three times, somewhere an Earth-like world will be born.

In other news…

The biometrics of a Baltic boatsman


Fauvelle, Mikael et al. “New investigations of the Hjortspring boat: Dating and analysis of the cordage and caulking materials used in a pre-Roman iron age plank boat.” PLOS One

Stars aren’t the only things leaving their dirty fingerprints in unexpected places this week. Archeologists working on the mysterious Hjortspring boat, a 2,400-year-old Scandinavian vessel, discovered a tantalizing partial human fingerprint in its caulking, providing “a direct link to the ancient seafarers who used this boat,” according to the study.
Photo of caulking fragment showing fingerprint on the left and high-resolution x-ray tomography scan of fingerprint region on the right. Image: Photography by Erik Johansson, 3D model by Sahel Ganji
The ridges of the fingerprint “fall within average distributions for both adult male and females as well as for juvenile adults, making it difficult to say much about the individual who produced the print,” said researchers led by Mikael Fauvelle of Lund University. “The most likely interpretation, however, is that it was made during repairs by one of the crew members on the boat itself, providing a direct link to the seafarers of the ancient vessel.”

Regardless of this person’s identity, their voyage didn’t end well. Researchers think the crew of the Hjortspring boat probably sailed from the eastern Baltic Sea to attack the Danish island of Als, where they were defeated. “The victors [deposited] the weapons of their vanquished foes together with one of their boats into the bog,” where they remained for millennia until they were rediscovered in the 1880s, the team said.

It’s a timeless reminder for would-be invaders: Don’t get caulky.

Long-time lurker, first-time poster


Oswald, Lisa et al. “Disentangling participation in online political discussions with a collective field experiment.” Science Advances.

At last, scientists have investigated the most elusive online demographic: the humble lurker. A team recruited 520 Redditors in the U.S. to participate in small subreddits focused on a variety of political topics during the summer of 2024. The aim was to probe why some people became prolific “power-users” that post with voluminous confidence, while others remained wallflowers.

“Online political discussions are often dominated by a small group of active users, while most remain silent,” said researchers led by Lisa Oswalt of the Max Planck Institute for Human Development. “This visibility gap can distort perceptions of public opinion and fuel polarization.”

The team found that “lurking (posting nothing) was most common among users who perceived discussions as toxic, disrespectful, or unconstructive.” Lurkers were offered small payments to post in the experiment, which succeeded in motivating some to contribute to discussions. As a result, the study concluded that “future interventions may be able to make online political discussions more representative by offering more positive social rewards for lurkers to post.”

At last, an opportunity to unionize the lurkers of the world. Solidarity (in silence) forever.

It’s the great pumpkin toadlet, Charlie Brown


Bornschein, Marcos R. et al. “A new species of Brachycephalus (Anura: Brachycephalidae) from Serra do Quiriri, northeastern Santa Catarina state, southern Brazil, with a review of the diagnosis among species of the B. pernix group and proposed conservation measures.” PLOS One.

We will close, as we have before, with an impossibly cute toadlet. Scientists have discovered this new species of “pumpkin toadlet” in the “cloud forests” of Brazil, a sentence so twee that it’s practically its own fairy tale. The tiny toad Brachycephalus lulai, pictured below on a pencil tip, belongs to a family of “flea toads” that are among the smallest vertebrates on Earth.
Basically it is very smol: Brachycephalus lulai is a tiny pumpkin toadlet measuring less than 14 mm in length. Photo: Luiz Fernando Ribeiro. Image credit 1: Luiz Fernando Ribeiro, CC-BY 4.0 (creativecommons.org/licenses/b…)
“Our team sought to better document the individual variation of all Brachycephalus species in southern Brazil, looking for them in the field over the past seven years,” said researchers led by Marcos R. Bornschein of São Paulo State University. “As a result of this work, we discovered and herein described a population collected on the eastern slope of Serra do Quiriri as a new species.”

The team also reported that the toads are actively colonizing newly formed cloud forests, which are high-altitude woods shrouded in mist. The researchers propose making these unique habitats into refuges for the adorable anurans.

Thanks for reading! See you next week.




Biohack Your Way To Lactose Tolerance (Through Suffering)


A biohacker with her lactose-rich slurry

A significant fraction of people can’t handle lactose, like [HGModernism]. Rather than accept a cruel, ice cream free existence, she decided to do something you really shouldn’t try: biohacking her way to lactose tolerance.

The hack is very simple, and based on a peer reviewed study from the 1990s: consume lactose constantly, and suffer constantly, until… well, you can tolerate lactose. If you’re lactose intolerant, you’re probably horrified at the implications of the words “suffer constantly” in a way that those milk-digesting-weirdos could never understand. They probably think it is hyperbole; it is not. On the plus side, [HGModernism]’s symptoms began to decline after only one week.

The study dates back to the 1980s, and discusses a curious phenomenon where American powdered milk was cluelessly distributed during an African famine. Initially that did more harm than good, but after a few weeks mainlining the white stuff, the lactose-intolerant Africans stopped bellyaching about their bellyaches.

Humans all start out with a working lactase gene for the sake of breastfeeding, but in most it turns off naturally in childhood. It’s speculated that rather than some epigenetic change turning the gene for lactose tolerance back on — which probably is not possible outside actual genetic engineering — the gut biome of the affected individuals shifted to digest lactose painlessly on behalf of the human hosts. [HGModernism] found this worked but it took two weeks of chugging a slurry of powdered milk and electrolyte, formulated to avoid dehydration due to the obvious source of fluid loss. After the two weeks, lactose tolerance was achieved.

Should you try this? Almost certainly not. [HGModernism] doesn’t recommend it, and neither do we. Still, we respect the heck out any human willing to hack the way out of the limitations of their own genetics. Speaking of, at least one hacker did try genetically engineering themselves to skip the suffering involved in this process. Gene hacking isn’t just for ice-cream sundaes; when applied by real medical professionals, it can save lives.

youtube.com/embed/h90rEkbx95w?…

Thanks to [Kieth Olson] for the tip!


hackaday.com/2025/12/13/biohac…

reshared this



GAZA. La tempesta fa 14 morti ma Israele blocca ancora gli aiuti


@Notizie dall'Italia e dal mondo
La tempesta Byron causa la morte di 14 gazawi mentre le tendopoli sono sommerse da fango e liquami. L'assemblea dell'ONU vota una risoluzione per obbligare Israele a sbloccare gli aiuti ma Trump prepara altre sanzioni per l'UNRWA
L'articolo GAZA. La tempesta fa 14 morti ma





Jesus Gutiérrez told immigration agents he was a U.S. citizen. Only after they scanned his face, did the agents let him go.#ICE #Privacy


How a US Citizen Was Scanned With ICE's Facial Recognition Tech


This article is a partnership between Reveal and 404 Media.

Jesus Gutiérrez, 23, was walking home one morning from a Chicago gym when he noticed a gray Cadillac SUV with no license plates. He kept walking, shrugging it off. Then the car pulled over and two men got out.

The federal immigration officials told him not to run. They then peppered Gutiérrez with questions: Where are you going? Where are you coming from? Do you have your ID on you?

Gutiérrez is a U.S. citizen. He told the officials this. He didn’t have any identification on him, but, panicking, he tried to find a copy on his phone. The agents put him into the car, where another two agents were waiting, and handcuffed him. Just sit there and be quiet, they said.

Without Gutiérrez’s ID, the agents resorted to another approach. They took a photo of his face. A short while later, the agents got their answer: “Oh yeah, he’s right. He’s saying the right thing. He does got papers,” Gutiérrez recalled the agents saying.

💡
Has this happened to you or someone you know? Do you have any videos of ICE or CBP scanning people's faces? Do you work for either agency? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

Gutiérrez’s experience, which he recounted to Reveal, is one snapshot of something that federal authorities have acknowledged to 404 Media that they are doing across the country: scanning people’s faces with a facial recognition app that brings up their name, date of birth, “alien number” if they’re an immigrant, and whether they have an order of deportation. 404 Media previously obtained internal Immigration and Customs Enforcement (ICE) emails revealing the agency’s facial recognition app, called Mobile Fortify, and catalogued social media videos showing agents scanning people’s faces to verify their citizenship.

Now, Reveal has spoken to a person who appears to have had that technology used against them. Gutiérrez sent Reveal a copy of his passport to verify his citizenship.

“You just grabbing, like, random people, dude,” Gutiérrez said he told the agents after they scanned his face. The officials eventually dropped off Gutiérrez after driving for around an hour. For several days, he didn’t go anywhere, not even to the gym. Gutiérrez told his father at the time that he “got kidnapped.”

“This is a flagrant violation of rights and incompatible with a free society,” said Nathan Freed Wessler, deputy project director for the American Civil Liberties Union’s (ACLU) Speech, Privacy, and Technology Project. “Immigration agents have no business scanning our faces with this glitchy, privacy-destroying technology—especially after often stopping people based on nothing more than the color of their skin or the neighborhood they live in.”
A screenshot of an internal DHS document obtained by 404 Media. Available here.
Mobile Fortify is available to ICE and Customs and Border Protection (CBP) officials on their work-issued phones. After an agent scans someone’s face, the app queries an unprecedented collection of U.S. government databases, including one run by the FBI and another that checks for outstanding state warrants, according to user manuals seen by 404 Media. The app runs the person’s face against a database of 200 million images, according to internal ICE material 404 Media viewed.

“The photograph shown [in the app’s results] is the photograph that was taken during the individual’s most recent encounter with CBP, however the matching will be against all pictures CBP may maintain on the individual,” said an internal Department of Homeland Security (DHS) document 404 Media obtained. The app turns the system usually used for verifying travelers at the border inward against people on U.S. streets.

The need for Mobile Fortify, according to that internal document, is for immigration authorities to identify people who can be removed from the country. But it acknowledges that it may be used against U.S. citizens, like in Gutiérrez’s case.

“It is conceivable that a photo taken by an agent using the Mobile Fortify mobile application could be that of someone other than an alien, including U.S. citizens or lawful permanent residents,” the document reads.

Rep. Bennie G. Thompson, ranking member of the House Homeland Security Committee, previously told 404 Media that ICE will prioritize the results of the app over birth certificates. “ICE officials have told us that an apparent biometric match by Mobile Fortify is a ‘definitive’ determination of a person’s status and that an ICE officer may ignore evidence of American citizenship—including a birth certificate—if the app says the person is an alien,” he said. “ICE using a mobile biometrics app in ways its developers at CBP never intended or tested is a frightening, repugnant, and unconstitutional attack on Americans’ rights and freedoms.”

404 Media has found other instances in which ICE and CBP agents have used a facial recognition app to verify someone’s identity and citizenship. In one that appeared to take place in Chicago, a Border Patrol officer stopped two young men on bicycles before asking his colleague, “Can you do facial?” The other official then scanned one of the boy’s faces, according to a video posted on social media. In another, a group of ICE officers surrounded a man driving a car. He said he was an American citizen. “Alright, we just got to verify that,” one of them said. A second then pointed their phone’s camera at the man and asked him to remove his hat. “If you could take your hat off, it would be a lot quicker,” the officer said. “I’m going to run your information.”

In Gutiérrez’s case, there is little indication that he was stopped for any reason beyond the color of his skin. He is of Mexican descent, he said. Stops of people based on their race, use of Spanish, or location (such as a car wash or bus stop) have become known among critics as “Kavanaugh stops,” after Supreme Court Justice Brett Kavanaugh justified the method in a September opinion.

ICE and CBP Agents Are Scanning Peoples’ Faces on the Street To Verify Citizenship
Videos on social media show officers from ICE and CBP using facial recognition technology on people in the field. One expert described the practice as “pure dystopian creep.”
404 MediaJoseph Cox


“The Government sometimes makes brief investigative stops to check the immigration status of those who gather in locations where people are hired for day jobs; who work or appear to work in jobs such as construction, landscaping, agriculture, or car washes that often do not require paperwork and are therefore attractive to illegal immigrants; and who do not speak much if any English,” the opinion says. (Gutiérrez speaks Spanish but conducted his interview with Reveal in English.) “If the officers learn that the individual they stopped is a U.S. citizen or otherwise lawfully in the United States, they promptly let the individual go. If the individual is illegally in the United States, the officers may arrest the individual and initiate the process for removal.”

The ACLU’s Wessler added: “In the United States, we should be free to go about our business without government agents scanning our faces, accessing our personal information, saving our photos for years, and putting us at risk of misidentifications and wrongful detentions. ICE and CBP’s use of Mobile Fortify on the streets of America should end immediately.”

DHS Assistant Secretary Tricia McLaughlin said in a statement, “DHS is not going to confirm or deny law enforcement capabilities or methods.” CBP said that the agency built the app to support ICE operations and that it has been used by ICE around the country.

A CBP spokesperson added in a statement, “Mobile Fortify is a law enforcement app developed by U.S. Customs and Border Protection for ICE agents and officers. It helps field personnel gather information during immigration inspections, but agents must consider all circumstances before deciding on someone's immigration status. CBP personnel working with ICE teams can access the app after completing required training. Further details cannot be shared due to law enforcement sensitivities.”

Gutiérrez said that at the end of his encounter, while he was still in the car, the agents were laughing.





Perché il lancio di SuperSim cambierà l’intelligenza artificiale

Per vedere altri post come questo, segui la comunità @Informatica (Italy e non Italy 😁)

SuperSim e l’illusione dell’AI generalista: la partita della simulazione del mondo reale. L'intervento di Gianmarco Gabrieli.

startmag.it/innovazione/supers…

reshared this








Stop the gatekeeping. The First Amendment is for all of us


Dear Friend of Press Freedom,

Rümeysa Öztürk has been facing deportation for 262 days for co-writing an op-ed the government didn’t like, and journalist Ya’akub Vijandre remains locked up by Immigration and Customs Enforcement over social media posts about issues he reported on. Read on for more on what we’re working on this week.

Stop the gatekeeping. The First Amendment’s for all of us


In the early days of the internet, online news confused analog-era judges, who pondered questions like, “If this is journalism then why are there no ink smudges on my fingers?” These days, First Amendment advocates tend to chuckle when thinking back on that era. But apparently it’s not quite over yet.

Freedom of the Press Foundation (FPF) Senior Adviser Caitlin Vogus wrote for the Sun-Sentinel about a judge in Florida’s unfortunate ruling that YouTube-based outlet Popcorned Planet can’t avail itself of the state’s reporter’s privilege to oppose a subpoena from actor Blake Lively. The court’s decision would “effectively exclude any independent journalist who publishes using online platforms from relying on the privilege to protect their sources.” If it stands, “vital information will stay buried,” she explained.

And FPF Executive Director Trevor Timm spoke to Columbia Journalism Review about another subpoena from Lively that’s testing whether celebrity blogger Perez Hilton can claim the privilege. “Hilton is gathering information, talking to sources, and publishing things in order to have the public consume them. That fits the definition of a journalist,” Timm explained. As CJR noted, FPF’s U.S. Press Freedom Tracker “was one of the few to highlight the Hilton case.”

It’s not a question of whether Popcorned Planet and Hilton are great journalists or if they pass some editorial purity test. It’s a question of whether the courts will allow litigants to chip away at First Amendment rights that protect all journalists, no matter what platform they use to report or what subjects they cover.


Administration is trolling America with its FOIA responses


As The New York Times reported this week, Immigration and Customs Enforcement claimed it has no body-worn camera footage from Operation Midway Blitz in Chicago, Illinois, despite a federal judge’s explicit order that agents wear and activate those cameras.

And as The Daily Beast reported, the Department of Homeland Security told FFP’s Daniel Ellsberg Chair on Government Secrecy Lauren Harper that Kristi Noem had no Truth Social Direct messages, despite her millions of followers. Harper requested cabinet officials’ messages in a Freedom of Information Act request after President Donald Trump accidentally publicly posted correspondence with Attorney General Pam Bondi.

As Harper told the Times, “They are trolling citizens and judges … ICE continues to feel increasing impunity and that it has the right to behave as a secret police that’s exempt from accountability.” FPF is, of course, appealing.


Don’t weaken Puerto Rico’s public records law


When the U.S. Navy quietly reactivated Roosevelt Roads Naval Station in Puerto Rico earlier this year, some residents saw the promise of new jobs, while others saw it as a painful reminder of past harms from the American military presence on the island.

Puerto Ricans — and Americans everywhere — deserve basic answers about what the military is up to as tensions escalate with Venezuela and whether Puerto Rico’s government is coordinating with the Pentagon and whether their concerns are being taken into account. And of course, there are countless local issues Puerto Ricans are entitled to be informed about.

But at the moment when transparency is most essential, lawmakers are trying to slam the door shut.


Don’t just take our word for it…


Throughout 2025 we’ve been hosting online events platforming journalists impacted by anti-press policies at the national and local levels, so you can hear directly from the people we hope will benefit from our work.

Read about three of our recent events. This week’s panel features journalists whose reporting is complicated by sources unwilling to come forward due to fear of retaliation. Last week we spoke with journalists about the difficulties of covering the immigration beat during Trump 2.0, and last month we talked about the immigration cases against journalists Sami Hamdi and Ya’akub Vijandre over their support for Palestinian rights (shoutout to our friends at The Dissenter for writing up that event). And there are even more past events on our YouTube channel.


WHAT WE'RE READING


Chokehold: Donald Trump’s war on free speech and the need for systemic resistance

Free Press
In a comprehensive new report, Free Press’s Nora Benavidez analyzes how Trump and his political enablers have sought to undermine and chill the most basic freedoms protected by the First Amendment.


Press freedom advocates sound alarm over Ya’akub Vijandre, stuck for over two months in ICE custody in Georgia

WABE
We cannot just accept that “every so often the administration is going to abduct some lawful resident who said something it doesn’t like about Israel or Palestine,” FPF’s Seth Stern told WABE.


Watched, tracked, and targeted: Life in Gaza under Israel’s all-encompassing surveillance regime

New York Magazine
A powerful essay by Palestinian journalist Mohammed Mhawish about life in Gaza “under Israel’s all-encompassing surveillance regime.”


​​ICEBlock creator sues Trump administration officials saying they pressured Apple to remove it from the app store

CNN
Threatening to punish app stores if they don’t remove apps the government dislikes is unconstitutional. This time it’s ICEBlock, but tomorrow it could be a news app.


Longtime LA radio exec Will Lewis dies; Went to prison in Hearst case

My News LA
Many heroes work behind the scenes on press freedom. Will Lewis was one of them. A radio executive who championed public media, he spent 15 days in prison to protect sources. RIP.


‘Heroic excavators of government secrets’

National Security Archive
Congratulations to the indefatigable National Security Archive on 40 years of clawing back the self-serving veil of government secrecy.


freedom.press/issues/stop-the-…



Cos’è la Agentic Ai Foundation per l’intelligenza artificiale aperta

Per vedere altri post come questo, segui la comunità @Informatica (Italy e non Italy 😁)

L'Aaif punta a creare uno standard universale e un linguaggio comune per gli agenti di intelligenza artificiale, con l’obiettivo di garantire interoperabilità, sicurezza e trasparenza. L'intervento startmag.it/innovazione/aaif-i…



IL RITORNO DEL TERMICO: Perché l'Elettrico ha perso la scommessa (Analisi Ingegneristica)


youtu.be/Dkh3fLianiE?si=QBpWJ9…


#Ucraina: l'Europa in trappola


altrenotizie.org/primo-piano/1…


L’informazione, di per sé, non significa nulla se non viene inserita nel proprio contesto. Un dato isolato può sembrare impressionante, ma spesso è fuorviante. Una citazione estratta dal suo discorso originale può assumere un significato che non le appartiene. Il blogger deve evitare che il suo contenuto diventi una tessera di un puzzle incompleto. La contestualizzazione è un atto di chiarezza che restituisce al lettore la complessità del mondo, senza semplificarlo in modo irresponsabile.


Spazio, Leonardo ambisce al mercato dei lanciatori? Ecco cosa lo fa pensare

@Notizie dall'Italia e dal mondo

Se l’Europa politica stenta ancora a dare segnali concreti di unità, l’industria, dal canto suo, sembra avere le idee chiare sul futuro. Anche più di quanto non racconti apertamente, almeno finora. Dal palco di Atreju, Roberto Cingolani ha rivelato ulteriori dettagli su



This week, we discuss conversational AI, a behind the scenes of the zine, and more.#BehindTheBlog


Behind the Blog: Is This Headline 'Clickbait'?


This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss conversational AI, a behind the scenes of the zine, and more.

EMANUEL: I made the terrible mistake of looking at some Hacker News comments this week for my story about a developer whose Google accounts were banned after he uploaded training data to Google Drive. Unbeknownst to him, the training data contained CSAM.

As we’ve explained in previous stories, CSAM is a subject we dread covering not only because it’s one of the most awful things one could think about, but because it’s extremely difficult and legally risky. For understandable reasons, the laws around viewing, let alone possessing CSAM, are strict and punishing, which makes verification for reporting reasons challenging. For similar reasons, it’s something we need to write about very carefully, making sure we don’t wrongfully associate or whitewash someone when it comes to such horrible behavior.

This post is for subscribers only


Become a member to get access to all content
Subscribe now




Dati, reti e deterrenza. Cosa emerge dall’esercitazione Cyber eagle

@Notizie dall'Italia e dal mondo

Si è chiusa una delle principali esercitazioni italiane dedicate alla difesa digitale, un appuntamento che restituisce una fotografia concreta di come il dominio cibernetico sia ormai parte integrante della sicurezza nazionale. L’Aeronautica militare ha presentato i risultati di



BOLIVIA. Arrestato l’ex presidente Luis Arce, timori per Evo Morales


@Notizie dall'Italia e dal mondo
In Bolivia la procura ha arrestato l'ex presidente di centrosinistra Luis Arce per malversazione di fondi pubblici. I sostenitori di Evo Morales temono che il prossimo ad essere arrestato sia l'ex leader del Movimento al Socialismo
L'articolo BOLIVIA. Arrestato l’ex



#ScuolaFutura, dal 12 al 15 dicembre, il campus itinerante sull’innovazione didattica promosso dal #MIM farà tappa a #Sanremo con i laboratori nazionali di orientamento dedicati alla musica e alle #STEM.

Science Channel reshared this.



Componenti cinesi nelle auto americane? L’allarme del Congresso per la sicurezza nazionale

@Notizie dall'Italia e dal mondo

La catena globale della produzione automobilistica è ormai diventata un fronte della competizione strategica tra Stati Uniti e Cina. E il messaggio è emerso con chiarezza durante un’audizione della House Select Committee on China, in cui i vertici della



Dal gas russo al Green Deal, passando per il riarmo: i nodi politici della plenaria di dicembre

Per vedere altri post sull' #IntelligenzaArtificiale, segui la comunità @Intelligenza Artificiale

La plenaria del Parlamento europeo che si terrà dal 16 al 18 dicembre si conferma come il passaggio istituzionale più rilevante dell’anno

CheGuevaraRoma reshared this.



FinTech und Datenschutz: PayPal sammelt die sexuellen Vorlieben von Kunden


netzpolitik.org/2025/fintech-u…

reshared this



I conti volano ma Xiaomi tira giù le serrande dei suoi negozi

Per vedere altri post come questo, segui la comunità @Informatica (Italy e non Italy 😁)

Come molte Big Tech americane, pure la cinese Xiaomi razionalizza i costi nonostante abbia conti in costante crescita. A farne le spese oltrehttps://www.startmag.it/innovazione/i-conti-volano-ma-xiaomi-tira-giu-le-serrande-dei-suoi-negozi/

CheGuevaraRoma reshared this.



56 anni fa, la strage di piazza Fontana a Milano. Strage fascista, dove morirono 17 persone e ne vennero ferite 88. Lo stato accusò gli anarchici, arrestarono il ferroviere Giuseppe Pinelli, che guarda caso morì cadendo dalla finestra della questura di Milano. Dissero che si era buttato... Una preghiera per le vittime della stage e per Pinelli, vittima innocente di un omicidio di stato.

La storia della strage di Piazza Fontana: perché cambiò l’Italia
geopop.it/strage-di-piazza-fon…






BENIN. Il golpe sventato grazie all’intervento della Francia e dell’Ecowas


@Notizie dall'Italia e dal mondo
Per sventare il tentato golpe in Benin sono intervenute le truppe dell'Ecowas, un'alleanza regionale fedele a Parigi. La Francia non vuole perdere la sua residua influenza in Africa dopo l'avvicinamento a Mosca di Burkina Faso, Mali e Niger
L'articolo BENIN. Il golpe sventato grazie